In some aspects, a system for maintaining segmentation of network traffic includes a first shared service domain comprising a first VPC, a first edge domain comprising a first transit gateway, a second edge domain comprising a second transit gateway communicatively coupled to the first transit gateway, and a second shared service domain comprising a second VPC. A first gateway connects the first shared service domain and the first edge domain, and a second gateway connects the second edge domain and the second shared service domain.
A two-tier firewall system includes a primary' and a secondary firewall gateway. The primary firewall gateway includes at least one spoke and a plurality of firewalls communicatively coupled to the at least one spoke. The secondary firewall gateway includes at least one spoke. The secondary firewall gateway is communicatively coupled to the primary firewall gateway.
An edge gateway deployed within an overlay network interconnecting a first public cloud network with an on-premises network is described. Coupled to a controller, the edge gateway is configured to receive a configuration file and attestation data from a controller, analyze the configuration file to obtain at least a first network address being used as an interface for secure communications with the controller, establish a secure interconnect with the controller based on the attestation data, and conduct a provisioning operation to initiate a request to the controller for edge gateway software thereby automated provisioning the edge gateway without human intervention. The edge gateway experiences automated provisioning based on a configuration file and attestation data upload.
In an embodiment, the present disclosure pertains to a method for creating a policy. In general, the method includes: (1) displaying a user interface to a user; (2) receiving, from the user, a policy type; (3) receiving a selection of at least one resource within a network; (4) receiving a resource operating parameter relative to the at least one resource within the network; (5) displaying previous data based, at least in part, on the resource operating parameter relative to the at least one resource responsive to a query by the user; (6) determining a recommended operation based, at least in part, on the previous data; and (7) displaying the recommended operation to the user via the user interface.
H04L 41/08 - Gestion de la configuration des réseaux ou des éléments de réseau
G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
In an embodiment, the present disclosure pertains to method for autonomous network scaling. In general, the method includes; (1) monitoring at least one resource within a network; (2) determining an operational load of the at least one resource; (3) comparing the operation load to a resource operating parameter of the at least one resource; determining a recommended operation based, at least in part, on the comparison of the operational load to the resource operating parameter of the at least one resource; and (4) modifying network topology of the network by performing at least one action including, but not limited to, adding or removing an additional resource response to the determining of the recommended operation. In some embodiments, the network includes a plurality of resources.
H04L 12/54 - Systèmes de commutation par mémorisation et restitution
H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
A distributed cloud computing system is disclosed that includes a. controller configured to deploy a first gateway in a first cloud computing network and a second gateway in a second cloud computing network. The system includes logic stored on non-transitory, computer-medium, that, upon execution by one or more processors, causes performance of operations including: receiving, from a controller, metadata pertaining to a plurality of constructs; receiving, from each of the first gateway and the second gateway, network data, wherein a combination of the metadata and the network data identify each of the plurality' of constructs and in which cloud computing network each construct is deployed: generating a visualization illustrating a cost analysis of at least one construct of the plurality of constructs, and causing rendering of the visualization on a display' screen of a network device.
H04L 43/045 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux pour la visualisation graphique des données de surveillance
H04L 67/75 - Services réseau en affichant sur l'écran de l'utilisateur les conditions du réseau ou d'utilisation
H04L 41/0826 - Réglages de configuration caractérisés par les objectifs d’un changement de paramètres, p. ex. l’optimisation de la configuration pour améliorer la fiabilité pour la réduction des coûts du réseau
H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
H04L 43/08 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux
H04L 43/20 - Dispositions pour la surveillance ou le test de réseaux de commutation de données le système de surveillance ou les éléments surveillés étant des entités virtualisées, abstraites ou définies par logiciel, p. ex. SDN ou NFV
7.
CONTROLLER FOR COORDINATING FLOW SEPARATION OF INTRA-VPC OR INTER-VPC COMMUNICATIONS
A system and method for controlling the handling of intra- VPC and inter- VPC communications is described. First, a destination of a communication is determined it resides within a first virtual private cloud network (VPC) of a source of the communication. If so, filtering communications between the destination and the source is controlled by native cloud constructs associated with a cloud service provider (CSP) underlay network for the first public cloud network. Otherwise, filtering communication between the destination and the source is controlled by a spoke gateway. The spoke gateway is part of a cloud overlay network configured to provide a communication path between the first virtual private cloud network and the second private cloud network.
A distributed cloud computing system is disclosed that includes a controller configured to deploy a first gateway in a first cloud computing network and a second gateway in a second cloud computing network and logic that, upon execution by one or more processors, causes performance of operations including: obtaining metadata pertaining to each of the first gateway and the second gateway, obtaining network data, wherein a combination of the metadata and the network data identify each of a plurality of constructs, the communication paths between each construct, and in which cloud computing network each construct is deployed, generating an elliptical layout of a network topology graph illustrating a first segment including the first gateway representing deployment in the first cloud network and a second segment including the second gateway representing deployment in the second cloud computing network, and causing rendering of the visualization on a network device display screen.
H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
9.
SYSTEMS AND METHODS FOR GENERATION OF A NETWORK TOPOLOGY AND CORRESPONDING USER INTERFACES
A distributed cloud computing system is disclosed that includes a controller configured to deploy a first gateway in a first cloud computing network and a second gateway in a second cloud computing network and logic that, upon execution by one or more processors, causes performance of operations including: obtaining metadata pertaining to each of the first gateway and the second gateway, obtaining network data, wherein a combination of the metadata and the network data identify each of a plurality of constructs, the communication paths between each construct, and in which cloud computing network each construct is deployed, generating an elliptical layout of a network topology graph illustrating a first segment including the first gateway representing deployment in the first cloud network and a second segment including the second gateway representing deployment in the second cloud computing network, and causing rendering of the visualization on a network device display screen.
G06F 8/75 - Analyse structurelle pour la compréhension des programmes
H04L 41/122 - Découverte ou gestion des topologies de réseau des topologies virtualisées, p. ex. les réseaux définis par logiciel [SDN] ou la virtualisation de la fonction réseau [NFV]
H04L 43/045 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux pour la visualisation graphique des données de surveillance
H04L 43/065 - Génération de rapports liés aux appareils du réseau
H04L 45/02 - Mise à jour ou découverte de topologie
G06F 3/04817 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect utilisant des icônes
G06F 3/04842 - Sélection des objets affichés ou des éléments de texte affichés
G06F 8/71 - Gestion de versions Gestion de configuration
H04L 12/66 - Dispositions pour la connexion entre des réseaux ayant différents types de systèmes de commutation, p. ex. passerelles
H04L 41/0266 - Échange ou transport d’informations de gestion de réseau en utilisant l’InternetIntégration de serveurs de gestion du Web dans des éléments de réseauProtocoles basés sur les services du Web en utilisant des métadonnées, des objets ou des commandes pour formater l’information de gestion, p. ex. en utilisant un langage de balisage eXtensible [XML]
H04L 41/082 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant des mises à jour ou des mises à niveau des fonctionnalités réseau
H04L 41/0853 - Récupération de la configuration du réseauSuivi de l’historique de configuration du réseau en recueillant activement des informations de configuration ou en sauvegardant les informations de configuration
10.
SYSTEMS AND METHODS FOR GENERATION OF A NETWORK TOPOLOGY AND CORRESPONDING USER INTERFACES
A distributed cloud computing system is disclosed that includes a controller configured to deploy network constructs including any of transit gateways, spoke gateways, subnets, or private networks and logic that, upon execution by one or more processors, causes performance of operations including: causing rendering of a graphical user interface that includes a display panel configured to display progress of a build process for a network topology graph, receiving first user input through the graphical user interface indicating selection of a first cloud service provider, a first access account, and a first cloud region, receiving second user input through the graphical user interface indicating selection of one or more of the network constructs to be deployed in the first cloud region, instructing the controller to deploy the one or more of the network constructs in the first cloud region according to the first user input and the second user input.
H04L 41/0895 - Configuration de réseaux ou d’éléments virtualisés, p. ex. fonction réseau virtualisée ou des éléments du protocole OpenFlow
H04L 41/122 - Découverte ou gestion des topologies de réseau des topologies virtualisées, p. ex. les réseaux définis par logiciel [SDN] ou la virtualisation de la fonction réseau [NFV]
H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
11.
SYSTEMS AND METHODS FOR IMPROVED MONITORING FEATURES FOR OF A NETWORK TOPOLOGY AND CORRESPONDING USER INTERFACES
A distributed cloud computing system includes a controller configured to (i) deploy and manage a first gateway in a first cloud computing network and a second gateway in a second cloud computing network, and (ii) manage a plurality of constructs; and logic, stored on non- transitory, computer-readable medium, that, upon execution by one or more processors, causes performance of operations. The operations include: receiving, from each of the first gateway and the second gateway, network data, generating an expected network traffic based upon the network data, generating a visualization illustrating an anomaly that deviates from the expected network traffic, and causing rendering of the visualization on a display screen of a network device.
H04L 12/66 - Dispositions pour la connexion entre des réseaux ayant différents types de systèmes de commutation, p. ex. passerelles
H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
12.
HIGH-PERFORMANCE COMMUNICATION LINK AND METHOD OF OPERATION
Embodiments of the disclosure relate to a secure, high-performance communication link that relies on single network, multiple logical port addressing. Embodiments of an infrastructure are associated with a high-performance communication link that allows for distribution of network traffic across multiple interconnects using a single network address with different logical network port addressing. This high-performance communication link supports data traffic across different processing logic units residing within a destination computing device.
A system and method for controlling the handling of intra- VPC and inter-VPC communications is described. First, a destination of a communication is determined it resides within a first virtual private cloud network (VPC) of a source of the communication. If so, filtering communications between the destination and the source is controlled by native cloud constructs associated with a cloud service provider (CSP) underlay network for the first public cloud network. Otherwise, filtering communication between the destination and the source is controlled by a spoke gateway. The spoke gateway is part of a cloud overlay network configured to provide a communication path between the first virtual private cloud network and the second private cloud network and using micro-segmentation to set and manage security policies.
H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
14.
SYSTEM AND METHOD FOR ANOMALY DETECTION IN A DISTRIBUTED CLOUD ENVIRONMENT
A distributed cloud computing system further includes logic, stored on non-transitory, computer-medium, that, upon execution by one or more processors, causes performance of operations including generating a first fingerprint for the first VPC being a statistical measure of a plurality of network metrics during a learning phase, generating a second fingerprint for the second VPC being a statistical measure of the plurality of network metrics during the learning phase, receiving, from the controller, metadata pertaining to each of the first gateway and the second gateway, receiving, from each of the first gateway and the second gateway, network data, wherein the metadata and the network data identify each of the plurality of constructs, the communication paths between each construct, and in which cloud computing network each construct is deployed, detecting an anomaly in one or more network traffic metrics of either the first VPC or the second VPC based on a comparison of received network traffic and a corresponding fingerprint, and generating an alert that the anomaly was detected.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projetsPlanification d’entreprise ou d’organisationModélisation d’entreprise ou d’organisation
G06F 21/50 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation
G06F 9/46 - Dispositions pour la multiprogrammation
G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
15.
SYSTEM AND METHOD FOR CLOUD-BASED FILTERING AND MODIFICATION OF MESSAGES WITH OVERLAPPING ADDRESSES
A network traffic filter system operates to detect network address overlapping conditions and, in response, preclude continued propagation over a cloud platform. Implemented with a controller, the network traffic filter system is configured to determine whether an incoming message is associated with a network address overlapping condition. This condition is detected when the incoming message received from a first tenant resource includes a subnetwork address that overlaps a subnetwork address relied upon by either (a) a component within the cloud platform or (b) a component associated with a second tenant resource different from the first tenant resource. Upon detecting the network address overlapping condition, the network traffic filter system signals a gateway, being a cloud component in communication with the first tenant resource, to either prevent messages associated with the subnetwork address from being routed over the cloud platform or substitute the subnetwork address with a non-overlapping, virtual subnetwork address.
H04L 45/745 - Recherche de table d'adressesFiltrage d'adresses
H04L 61/103 - Correspondance entre adresses de types différents à travers les couches réseau, p. ex. résolution d’adresse de la couche réseau dans la couche physique ou protocole de résolution d'adresse [ARP]
H04L 45/64 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données à l'aide d'une couche de routage superposée
H04L 61/2503 - Traduction d'adresses de protocole Internet [IP]
H04L 61/4535 - Répertoires de réseauCorrespondance nom-adresse en utilisant une plate-forme d'échange d'adresses qui établit une session entre deux nœuds, p. ex. des serveurs de rendez-vous, des gardes-barrières de protocoles d'initiation de session [SIP] ou contrôleurs d’accès H.323
H04L 61/5046 - Résolution des conflits d'allocation d'adressesTest des adresses
16.
CONTROLLER-BASED TRAFFIC FILTERING AND ADDRESS MODIFICATION
In communication with components of a cloud platform, namely a software-defined network constructed to overlay at least one public cloud network, a controller features a virtual processor and a data store. The data store includes network address translation (NAT) processing logic configured to determine whether a control plane message from tenant resources is associated with a network address overlapping condition, which represents a first network address included in the control plane message overlaps a network address range relied upon by either (a) at least one of the components of the cloud platform or (b) a component associated with other tenant resources. The NAT processing logic is further configured to alter routing data stores that maintain routing information for each of the components of the cloud platform to substitute the first network address with a first virtual network address for subsequent data message routing.
A multi-cloud overlay network for supporting communications between a first public cloud network and a second public cloud network. The overlay network features a management virtual private network, which includes a network load balancing (NLB) component and a controller registered as a target on a port of the NLB component. The overlay network further includes one or more spoke or transit gateways and a multi-cloud access virtual private cloud (VPC) operating within the first public cloud network, and a remote cloud load balancer component operating the second public cloud network. The remote cloud load balancer component is communicatively coupled between the multi-cloud access VPC and one or more remote spoke or transit gateways. The multi-cloud access VPC includes a VPC endpoint that is assigned a private IP address and communicatively coupled to the NLB component and a virtual private network (VPN) gateway communicatively coupled to a private transport.
A computerized method for avoiding cross-region communications when utilizing a cloud overlay network is described. The method involves an operation of deploying one or more spoke gateways within at least a first region and a second region of a first virtual private cloud network. Thereafter, a region and a virtual private cloud network associated with a source and a destination of a communication are determined. Upon determining that the destination of the communication resides within a second virtual private cloud network, which is different than the first virtual private cloud network, the routing of the communication between the source and the destination is controlled by one or more spoke gateways solely residing within the region in which the source.
In one embodiment, a controller features a first data store, a second data store and route determination logic. The first data store is configured to store current routing information from a source transit gateway within at least a first transit cloud network to a destination transit gateway within at least a second transit cloud network of the cloud network. Each of the source transit gateway and the destination transit gateway being one of a plurality of transit gateways associated with the cloud network. The second data store is configured to store alternative routing information between the source transit gateway and the destination transit gateway. The route determination logic is configured to (i) conduct analytics on all available route paths for a message intended to be sent from the source transit gateway to the destination transit gateway and (ii) select a best route path for the message.
H04L 43/08 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux
H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
20.
SYSTEM AND METHOD FOR AUTOMATING APPLIANCE CONFIGURATION AND OPERABILITY
In one embodiment, a cloud connection appliance features a processor and a non- transitory storage medium. The non -transitory storage medium comprises management control logic, that when executed by the processor, controls registration with a controller adapted to control data traffic between gateway instance and to establish a communication path including a reverse tunnel with the controller. The controller and cloud connection appliance operate in a client-server relationship with the cloud connection appliance operates as a client when establishing the communication path and operates as a server when receiving control information through the reverse tunnel. The reverse tunnel enables the cloud connection appliance to directly receive the control information from the controller despite the cloud connection application lacking a publicly routable Internet Protocol (IP) address.
A computerized method for providing network policy-based routing of a data flow is described. After obtaining attributes associated with an incoming data flow, a first gateway is configured to determine one or more network policies based on the attributes associated with the incoming data flow and assign a classification identifier based on the one or more network policies. The classification identifier is configured to influence routing paths through at least one cloud network, where the classification identifier is encapsulated into content of the incoming data flow to generate a classified data flow for routing from a source to a destination through the at least one cloud network.
A system features classification architectures for policy-based, data traffic management. A first architecture type is a controller and nodes operating as a Kubernetes cluster. The cluster includes a master node and an ingress node configured to access the master node to obtain attribute(s) for a data flow received by the ingress node, determine a network policy applicable to the data flow based on the attribute(s), and determine a classification identifier, based on the network policy, to provide context associated with the data flow and reliable association. The second architecture type features an ingress gateway including data analytic logic and message reconfiguration logic. The data analytic logic determines a network policy applicable to the data flow and assigns the classification identifier to influence routing paths. The message reconfiguration logic encapsulates the classification identifier into data flow content to generate a classified data flow for routing through a cloud or multi-cloud network.
A network architecture including a layered transit virtual private cloud network and interface logic that controls the egress and ingress of messages between the transit VPC and an on- premises network. First, the layered transit VPC includes a first transit gateway cluster communicatively coupled to one or more spoke VPCs for receipt of messages from cloud instances and a second transit gateway cluster communicatively coupled to the on-premises network. The layered transit VPC supports increased scalability for the spoke VPCs. Second, the interface logic is configured to operate in concert with a gateway cluster that controls operability of a router by at least controlling propagation of messages into or from the on- premises network via one or more selected gateways forming the gateway cluster.
A computerized method for restricting communications between virtual private cloud networks comprises creating a plurality of security domains. Each of the plurality of security domains identifies gateways associated with one or more virtual private cloud networks. Also, the method features generating transit routing data stores in accordance with each of the plurality of security domains; determining whether a connection policy exists between at least a first security domain and a second security domain of the plurality of security domains; and precluding communications between gateways associated with the first security domain and gateways associated with the second security domain in response to determining that no connection policy exists between the first security domain and the second security domain.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données
25.
SYSTEM AND METHOD FOR SEGMENTING TRANSIT CAPABILITIES WITHIN A MULTI-CLOUD ARCHITECTURE
In one embodiment, a computing platform features a controller, one or more transit virtual private cloud networks (VPCs), and a plurality of spoke VPCs. Communicatively coupled to the transit virtual VPCs, the spoke VPCs include (i) a first spoke VPC associated with a first security region and (ii) a second spoke VPC associated with a second security region. Herein, the first security region is configured to permit spoke gateways of the first spoke VPC to communicate with each other while precluding communications with spoke gateways associated with another security region absent a connectivity policy being a set of rules established by the administrator/user of the network concerning permitted connectivity between different security regions.
In one embodiment, a computing platform featuring a controller and a first virtual private cloud network, which is communicatively coupled to the controller. The first virtual private cloud network includes at least a first gateway including egress filtering logic. The egress filtering logic is configured to (i) filter messages routed from the first gateway in accordance with a first set of filtering rules maintained by the first gateway and (ii) bypass the filtering of messages directed to or originating from one or more subnetworks in accordance with the first set of filtering rules.
In one embodiment, a computing platform features a controller in communication with one or more virtual private cloud networks, including a first virtual private cloud network (VPC). The virtual private cloud network includes at least a first egress filtering gateway configured to filter egress traffic data received from a first gateway and route the filtered egress traffic data to a public network in accordance with a first set of filter rules. The first set of filter rules are included as part of a first security policy provided by the controller.
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
H04L 41/00 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets
A computerized method for utilizing private Internet Protocol (IP) addressing for communications between components of one or more public cloud networks. The method features determining whether outbound traffic corresponds to a first type of outbound traffic being forwarded from a cloud instance supported by the gateway. In response to determining that the first type of outbound traffic is being forwarded from the cloud instance, the first type of outbound traffic is directed via a data interface of the gateway. Also, the method features determining whether the outbound traffic corresponds to a second type of outbound traffic being initiated by logic within the gateway. In response to determining that the second type of outbound traffic is being initiated by logic within the gateway, directing the second type of outbound traffic via a management interface of the gateway.
A distributed cloud computing system is disclosed that includes a controller configured to deploy a first gateway in a first cloud computing network and a second gateway in a second cloud computing network and logic. The logic, upon execution by one or more processors, causes operations including receiving, from the controller, metadata pertaining to a plurality of constructs, receiving, from each of the first and second gateways, network data, deriving heat map information detailing a density of network traffic at a plurality of geographic locations, wherein the network traffic is transmitted across multiple cloud computing networks, generating a heat map visualization illustrating the density of the network traffic that includes a map of a geographic region as well as an overlay of visual indicators representing the density of the network traffic, and causing rendering of the heat map visualization on a display screen of a network device.
G06F 3/00 - Dispositions d'entrée pour le transfert de données destinées à être traitées sous une forme maniable par le calculateurDispositions de sortie pour le transfert de données de l'unité de traitement à l'unité de sortie, p. ex. dispositions d'interface
30.
SYSTEM AND METHOD FOR GENERATING A NETWORK HEALTH DATA AND OTHER ANALYTICS FOR A MULTI-CLOUD ENVIRONMENT
A distributed cloud computing system is disclosed that includes a controller configured to deploy a first gateway in a first cloud computing network and a second gateway in a second cloud computing network and logic. The logic, upon execution by one or more processors, causes operations including receiving, from the controller, metadata pertaining to a plurality of constructs, receiving, from each of the first and second gateways, network data, deriving heat map information detailing a density of network traffic at a plurality of geographic locations, wherein the network traffic is transmitted across multiple cloud computing networks, generating a heat map visualization illustrating the density of the network traffic that includes a map of a geographic region as well as an overlay of visual indicators representing the density of the network traffic, and causing rendering of the heat map visualization on a display screen of a network device.
H04L 12/24 - Dispositions pour la maintenance ou la gestion
G06F 3/048 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI]
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation