H04L43/06

Self-adjusting connection pool in a distributed system
11580130 · 2023-02-14 · ·

A method includes calculating first connection usage information based on a first number of connections being used in a connection pool over a first time interval and adding a first number of database connections to the connection pool based on determining that the first connection usage information satisfies a first usage threshold. Additionally, the method includes calculating second connection usage information based on a second number of connections being used in the connection pool over a second interval. The second interval has been previously reset responsive to adding the first number of database connections to the connection pool. The method also includes determining whether to adjust the number of database connections in the connection pool based on the second connection usage information.

Determining multiple ways for compromising a network node in a penetration testing campaign

Methods and systems for penetration testing of a networked system involve assigning network nodes to disjoint classes based on current information about the compromisability of the network nodes. The classes distinguish between nodes not currently known to be compromisable, nodes that only recently have become known to be compromisable, e.g., by a first method of a attack, and nodes that have been known for a longer time to be compromisable. Nodes that only recently have become known to be compromisable can be re-targeted by the penetration testing system to determine whether such nodes can be compromised using multiple methods of attack and not just using the first method of attack.

Determining multiple ways for compromising a network node in a penetration testing campaign

Methods and systems for penetration testing of a networked system involve assigning network nodes to disjoint classes based on current information about the compromisability of the network nodes. The classes distinguish between nodes not currently known to be compromisable, nodes that only recently have become known to be compromisable, e.g., by a first method of a attack, and nodes that have been known for a longer time to be compromisable. Nodes that only recently have become known to be compromisable can be re-targeted by the penetration testing system to determine whether such nodes can be compromised using multiple methods of attack and not just using the first method of attack.

Technologies for providing shared memory for accelerator sleds

Technologies for providing shared memory for accelerator sleds includes an accelerator sled to receive, with a memory controller, a memory access request from an accelerator device to access a region of memory. The request is to identify the region of memory with a logical address. Additionally, the accelerator sled is to determine from a map of logical addresses and associated physical address, the physical address associated with the region of memory. In addition, the accelerator sled is to route the memory access request to a memory device associated with the determined physical address.

Technologies for providing shared memory for accelerator sleds

Technologies for providing shared memory for accelerator sleds includes an accelerator sled to receive, with a memory controller, a memory access request from an accelerator device to access a region of memory. The request is to identify the region of memory with a logical address. Additionally, the accelerator sled is to determine from a map of logical addresses and associated physical address, the physical address associated with the region of memory. In addition, the accelerator sled is to route the memory access request to a memory device associated with the determined physical address.

REPORTING OCCURRENCE OF AN EVENT IN A MOBILE COMMUNICATION NETWORK

For data collection, apparatuses, methods, and systems are disclosed. One apparatus 800 includes a transceiver 825 that receives 905 a first request from a network analytics function to monitor and report occurrences of a first event. The apparatus 800 includes a processor 805 that identifies 910 a first type of network function in a mobile communication network that reports occurrence of the first event. The processor 805 sends 915 a second request to at least one network function of the first type to monitor and report occurrences of the first event and relays 920 reports of occurrence of the first event from the at least one network function to the network analytics function.

REPORTING OCCURRENCE OF AN EVENT IN A MOBILE COMMUNICATION NETWORK

For data collection, apparatuses, methods, and systems are disclosed. One apparatus 800 includes a transceiver 825 that receives 905 a first request from a network analytics function to monitor and report occurrences of a first event. The apparatus 800 includes a processor 805 that identifies 910 a first type of network function in a mobile communication network that reports occurrence of the first event. The processor 805 sends 915 a second request to at least one network function of the first type to monitor and report occurrences of the first event and relays 920 reports of occurrence of the first event from the at least one network function to the network analytics function.

Apparatus and method for network automation in wireless communication system

Disclosed is a 5.sup.th generation (5G) or a pre-5G communication system provided to support a higher data transmission rate than that of post-4.sup.th generation (4G) communication systems, such as long term evolution (LTE). A method of operating a network node in a wireless communication system is provided. The method includes receiving, from a plurality of first network nodes, network data, generating first recommendation operation information for a second network node based on the network data, and transmitting, to the second network node, a first analysis result message including the first recommendation operation information.

Method and apparatus for renewing subscription for network data analysis in wireless communication system

The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. The disclosure provides a method for renewing a subscription for network data collection and analysis in a wireless communication system.

Method and apparatus for renewing subscription for network data analysis in wireless communication system

The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. The disclosure provides a method for renewing a subscription for network data collection and analysis in a wireless communication system.