Patent classifications
G06F2009/45595
Preloading of virtual devices in anticipation of a connection request from a physical device
Latency experienced by a user of a client device may be reduced by preloading virtual devices in anticipation of a connection request from the client device. For example, a plurality of virtual devices may be partially loaded prior to a connection request from a client device. In response to the connection request from the client device, a user associated with the client device may be identified and user profile information associated with the user may be retrieved. Based on the retrieved user profile information associated with the user, a virtual device, from among the plurality of preloaded virtual devices, may be loaded, such that the loading of the virtual device is complete and is specific to the user of the client device.
OBTAINING OPTICAL SIGNAL HEALTH DATA IN A STORAGE AREA NETWORK
An aspect of obtaining optical signal health data in a SAN includes receiving, by a computer processor, a request for data corresponding to current operational characteristics of elements of a storage area network to which a host system computer has access. A further aspect includes instantiating, by the computer processor, a virtual host bus adapter interface on the host system computer, transmitting, via the virtual host bus adapter interface, the request to the elements in the portion of the storage area network, aggregating data received from each of the elements, and displaying the aggregated data via the computer processor.
Dynamic functional partitioning for security pass-through virtual network function (VNF)
A network device or system can operate to enable a security pass-through with a user equipment (UE) and further define various virtual functions between a physical access point (pAP) and a virtual AP (vAP) based on one or more communication link parameters (e.g., latency). The security pass-through can be an interface connection that passes through a computer premise equipment (CPE) or wireless residential gateway (GW) without the CPE or GW modifying or affecting the data traffic such as by authentication or security protocol. The SP network device can receive traffic data from a UE through or via the security pass-through from a UE of a community Wi-Fi network at a home, residence, or entity network.
Pre-filtering of traffic subject to service insertion
The disclosure provides an approach for pre-filtering traffic in a logical network. One method includes receiving, by a hypervisor, a packet from a virtual computing instance (VCI) and determining a service path for the packet based on a service table. The method further includes setting, by the hypervisor, a pre-filter component as a next hop for the packet based on the service path. The method further includes receiving, by the pre-filter component, the packet. The method further includes making a determination, by the pre-filter component, of whether the packet requires processing by the security component. The method further includes performing, by the pre-filter component, based on the determination, one of: forwarding the packet to its destination and bypassing the security component; or forwarding the packet to the security component.
SCALING SERVICE DISCOVERY IN A MICRO-SERVICE ENVIRONMENT
Systems and methods provide for scaling service discovery in a micro-service environment. A controller can inject a service discovery agent onto a host. At least one of the controller or the agent can identify a first set of micro-service containers that are dependencies of the first micro-service container and a second set of micro-service containers that are dependencies of the second micro-service container. At least one of the controller or the agent can update routing data for the first set of micro-service containers and the second set of micro-service containers. At least one of the controller or the agent can determine the second micro-service container has terminated on the host computing device. At least one of the controller or the agent can update the agent to remove the routing data for the second set of micro-service containers.
Host Routed Overlay with Deterministic Host Learning and Localized Integrated Routing and Bridging
Systems, methods, and devices for improved routing operations in a network computing environment. A system includes a virtual customer edge router and a host routed overlay comprising a plurality of host virtual machines. The system includes a routed uplink from the virtual customer edge router to one or more of the plurality of leaf nodes. The system is such that the virtual customer edge router is configured to provide localized integrated routing and bridging (IRB) service for the plurality of host virtual machines of the host routed overlay.
CAPACITY REDUCTION AND CAPACITY EXPANSION METHOD AND SYSTEM FOR CLUSTER, CAPACITY REDUCTION AND CAPACITY EXPANSION CONTROL TERMINAL, AND MEDIUM
The present disclosure provides a capacity reduction and capacity expansion control terminal, a computer-readable medium, and a capacity reduction and capacity expansion system for a cluster. A capacity reduction and capacity expansion method for a cluster includes: acquiring performance data of a target cluster; determining whether the target cluster needs capacity expansion or capacity reduction according to the performance data; when it is determined that the target cluster needs the capacity expansion, controlling a cloud platform to create a first virtual host, and adding the first virtual host to the target cluster; and when it is determined that the target cluster needs the capacity reduction, controlling the cloud platform to remove a second virtual host from the target cluster.
INFORMATION PROCESSING DEVICE, METHOD AND RECORDING MEDIUM STORING COMPUTER PROGRAM
An information processing device is an information processing device serving as a member device that constitutes a network system, including: a detection unit that performs autonomous inquiry to the connected network system and detects another member device that together forms the network system; and a list management unit that, when the another member device is detected by the detection unit, updates a list indicating member devices of the network system that are newly registered in the network system via the another member device.
Proxyless Network Address Translation With Dynamic Port Allocation
Aspects of the disclosure provide for a proxyless NAT infrastructure with dynamic port allocation. A proxyless NAT infrastructure is configured to perform NAT between a network of virtual machines (VMs) and a device external to the network, without a device, such as a NAT server or a router, acting as a proxy. A system can include a control plane for provisioning VMs of a network, including configuring each VM to perform NAT and initially assigning a number of ports for communicating with other devices. The control plane maintains a feedback loop—receiving data characterizing port usage and network traffic at ports allocated to the various VMs and scaling the port allocation for each VM based on the received data. The control plane can allocate additional ports as determined to be needed by a VM, and later retrieve the ports to be reused for other VMs.
Storage Device For Performing Access Authority Control And Operating Method Thereof
A storage device for performing an access authority control and an operating method thereof are disclosed. The storage device including processing circuitry configured to store a plurality of security information associated with the plurality of namespaces in response to a command from the host, each of the security information including virtual machine information associated with a corresponding one of the plurality of virtual machines and unique information associated with the corresponding virtual machine, the virtual machine information including an identifier for the corresponding virtual machine, and the unique information including unique information uniquely set for the corresponding virtual machine, extract at least first information by decoding a data access request received from the host device, and abort processing of the data access request based on the security information and the extracted at least one first information.