Patent classifications
H04L43/04
Telemetry-based network switch configuration validation
Methods, apparatuses, and computer program products for telemetry-based network switch configuration validation are disclosed. An analytics engine captures a first network snapshot including telemetry data received from one or more network switches in a first state. Upon receiving a notice indicating that a network configuration change has been applied, the analytics engine initiates a timer in response to receiving the notice. The analytics engine captures, in response to expiration of the timer, a second network snapshot including telemetry data received from the one or more network switches in a second state and compares the first network snapshot and the second network snapshot. In dependence upon the comparison of the first network snapshot to the second network snapshot, the analytics engine validates the network configuration change.
Technologies for providing shared memory for accelerator sleds
Technologies for providing shared memory for accelerator sleds includes an accelerator sled to receive, with a memory controller, a memory access request from an accelerator device to access a region of memory. The request is to identify the region of memory with a logical address. Additionally, the accelerator sled is to determine from a map of logical addresses and associated physical address, the physical address associated with the region of memory. In addition, the accelerator sled is to route the memory access request to a memory device associated with the determined physical address.
Technologies for providing shared memory for accelerator sleds
Technologies for providing shared memory for accelerator sleds includes an accelerator sled to receive, with a memory controller, a memory access request from an accelerator device to access a region of memory. The request is to identify the region of memory with a logical address. Additionally, the accelerator sled is to determine from a map of logical addresses and associated physical address, the physical address associated with the region of memory. In addition, the accelerator sled is to route the memory access request to a memory device associated with the determined physical address.
TRACING AND EXPOSING DATA USED FOR GENERATING ANALYTICS
The present disclosure relates to the generation of analytics in a mobile network. The disclosure is concerned with tracing and exposing data information, which is used for generating analytics outputs, in order to enable examination of the analytics outputs. The disclosure thus proposes network entities and methods, which support the analytics generation and examination thereof, respectively. For instance, a first network entity for analytics generation is configured to receive, from a second network entity, a request for providing analytics information associated with at least one generated analytics output. Further, it is configured to provide the analytics information to the second network entity, wherein the analytics information comprises data information used to generate the at least one generated analytics output, wherein the data information comprises reference to data or data itself.
TRACING AND EXPOSING DATA USED FOR GENERATING ANALYTICS
The present disclosure relates to the generation of analytics in a mobile network. The disclosure is concerned with tracing and exposing data information, which is used for generating analytics outputs, in order to enable examination of the analytics outputs. The disclosure thus proposes network entities and methods, which support the analytics generation and examination thereof, respectively. For instance, a first network entity for analytics generation is configured to receive, from a second network entity, a request for providing analytics information associated with at least one generated analytics output. Further, it is configured to provide the analytics information to the second network entity, wherein the analytics information comprises data information used to generate the at least one generated analytics output, wherein the data information comprises reference to data or data itself.
INFORMATION PROCESSING METHOD AND APPARATUS, NODE DEVICE, SERVER AND STORAGE MEDIUM
The embodiments of the present disclosure provide a method and apparatus for information processing, a node device, a server and a storage medium. The method includes that: characteristic information is extracted from an acquired service packet; and the characteristic information is sent to a server, so that the server generates, according to the characteristic information, a detection instance for detecting a service flow corresponding to the service packet. Thus, by extracting the characteristic information of the service packet, the server generates a detection instance corresponding to the characteristic information, achieving the flexible deployment and application of channel associated performance detection, and reducing the difficulty and cost of manual maintenance.
INFORMATION PROCESSING METHOD AND APPARATUS, NODE DEVICE, SERVER AND STORAGE MEDIUM
The embodiments of the present disclosure provide a method and apparatus for information processing, a node device, a server and a storage medium. The method includes that: characteristic information is extracted from an acquired service packet; and the characteristic information is sent to a server, so that the server generates, according to the characteristic information, a detection instance for detecting a service flow corresponding to the service packet. Thus, by extracting the characteristic information of the service packet, the server generates a detection instance corresponding to the characteristic information, achieving the flexible deployment and application of channel associated performance detection, and reducing the difficulty and cost of manual maintenance.
PASSIVE MEASUREMENT OF COMMUNICATION FLOWS
Methods, systems, and devices for communications are described. One or more flows between a node and one or more other nodes in a communication network may be monitored over a time period. During the monitoring, it may be identified that, during a subset of the time period, communications over at least one of the flows were restricted by the communication network based on receiving at least one indicator of congestion for the at least one flow. A quantity of traffic communicated over the one or more flows during the subset of the time period may then be determined, and respective flow rates of the one or more flows may be obtained. The obtained flow rates may be used to calculate a data rate of one or more connections between the node and the one or more other nodes.
ANOMALY DETECTION USING TENANT CONTEXTUALIZATION IN TIME SERIES DATA FOR SOFTWARE-AS-A-SERVICE APPLICATIONS
A system may include a historical time series data store that contains electronic records associated with Software-as-a-Service (“SaaS”) applications in a multi-tenant cloud computing environment (including time series data representing execution of the SaaS applications). A monitoring platform may retrieve time series data for the monitored SaaS application from the historical time series data store and create tenant vector representations associated with the retrieved time series data. The monitoring platform may then provide the retrieved time series data and tenant vector representations together as final input vectors to an autoencoder to produce an output including at least one of a tenant-specific loss reconstruction and tenant-specific thresholds for the monitored SaaS application. The monitoring platform may utilize the output of the autoencoder to automatically detect an anomaly associated with the monitored SaaS application.
Dynamic throughput ingestion of backup sources
A method and apparatus for dynamically adjusting an ingestion rate for backup operations on a source system. The method generally includes monitoring a resource utilization related to one or more performance metrics of the source system in performing at least a primary workload. Based on the monitored resource utilization, the backup system determines a data ingestion rate for backup operations on the source system. The backup system ingests data from the source system to a backup repository at the determined data ingestion rate.