H04L45/30

Split testing with custom cache keys for content delivery networks
11652908 · 2023-05-16 · ·

Disclosed are systems and methods for enabling an application developer to define CDN behavior (e.g., caching rules) alongside an application program code and embedded in the same source code. The systems and methods can be used to define CDN or edge caching behavior using custom cache keys that go beyond simply using a URL. The custom cache keys and source code CDN behavior definitions can be used to enable a graphical user interface to specify traffic rules in a codeless interface. The described embodiments can be used for defining general traffic routing, to test different versions of the application or to otherwise present different versions of the application to end users, while preserving cache keys and caching behavior at the edge and throughout the application distribution layers.

DATA TRAFFIC CONTROL

As an example, a method includes storing, in non-transitory memory, prioritization rules that establish a priority preference for egress of data traffic for a first location. The first location includes a first location apparatus to control egress of data traffic for the first location apparatus and a second location apparatus at a second location, which is different from the first location, to receive data traffic and cooperate with the first apparatus to measure bandwidth with respect to the first location. The first location apparatus is coupled with the second location apparatus via at least one bidirectional network connection. The method also includes estimating capacity of the at least one network connection for the egress of data traffic with respect to the first location. The method also includes categorizing each packet in egress data traffic from the first location based on an evaluation of each packet with respect to the prioritization rules. The method also includes placing each packet in one of a plurality of egress queues associated with the at least one network connection at the first location apparatus according to the categorization of each respective packet and the estimated capacity. The method also includes sending the packets from the first location apparatus to the second location apparatus via a respective network connection according to a priority of the respective egress queue into which each packet is placed, such that the first location apparatus transmits at the estimated capacity for the egress of data traffic.

Control apparatus, control apparatus control method, and program
09847916 · 2017-12-19 · ·

A control apparatus includes a packet handling operation setting unit that sets a packet handling operation for processing a packet for a communication node selected from a plurality of communication nodes. The packet handling operation setting unit sets the packet handling operation for communication nodes out of the plurality of communication nodes other than the selected communication node, in response to the fact that it was possible to set the packet handling operation for the selected communication node.

Optimizing routing of data across a communications network

A method begins by a first computing device determining a routing plan to route a set of encoded data slices from the first computing device to a second computing device via a plurality of network paths of a communications network. The method continues with the second computing device receiving encoded data slices via one or more network paths. When the second computing device receives a decode threshold number of encoded data slices, the method continues with the second computing device sending a message to the communications network indicating receipt of the decode threshold number of encoded data slices. The method continues with a relay unit determining whether the relay unit is in possession of a not-yet delivered encoded data slice. When the relay unit is in possession of the not-yet delivered encoded data slice, the method continues with the relay unit ceasing forwarding of the not-yet delivered encoded data slice.

PIM source discovery by last hop router

Techniques are described for enhancements to Protocol Independent Multicast (PIM) to enable a last hop router (LHR) to perform source discovery and directly build or join a source tree. According to the techniques of this disclosure, the LHR builds a communication channel with a rendezvous point (RP) router and requests source information for at least one multicast group for which the LHR has interested receivers. The RP responds to the request by looking into a register database maintained by the RP and sending source information indicating at least one source that is actively providing traffic for the at least one multicast group. Based on the response, the LHR initiates a (S,G) PIM Join message toward the at least one source for the at least one multicast group to directly build or join at least one source tree.

Dynamic configuration of inter-chip and on-chip networks in cloud computing system
11677813 · 2023-06-13 · ·

A server includes a plurality of nodes that are connected by a network that includes an on-chip network or an inter-chip network that connects the nodes. The server also includes a controller to configure the network based on relative priorities of workloads that are executing on the nodes. Configuring the network can include allocating buffers to virtual channels supported by the network based on the relative priorities of the workloads associated with the virtual channels, configuring routing tables that route the packets over the network based on the relative priorities of the workloads that generate the packets, or modifying arbitration weights to favor granting access to the virtual channels to packets generated by higher priority workloads.

Dynamic configuration of inter-chip and on-chip networks in cloud computing system
11677813 · 2023-06-13 · ·

A server includes a plurality of nodes that are connected by a network that includes an on-chip network or an inter-chip network that connects the nodes. The server also includes a controller to configure the network based on relative priorities of workloads that are executing on the nodes. Configuring the network can include allocating buffers to virtual channels supported by the network based on the relative priorities of the workloads associated with the virtual channels, configuring routing tables that route the packets over the network based on the relative priorities of the workloads that generate the packets, or modifying arbitration weights to favor granting access to the virtual channels to packets generated by higher priority workloads.

Time-sensitive networking (TSN) packet forwarding

A packet forwarding method includes receiving N Time-Sensitive Networking (TSN) packet flows, where each of the N TSN packet flows corresponds to a constraint condition that defines duration of a cycle, a maximum quantity of packets that are allowed to be transmitted in the cycle, and a maximum length of a single packet, and forwarding the N TSN packet flows based on a new constraint condition, where the new constraint condition is based on the constraint condition corresponding to each of the N TSN packet flows and defines duration of a new cycle, a new maximum quantity of new packets that are allowed to be transmitted in the new cycle, and a new maximum length of a new packet, where each of the N TSN packet flows is forwarded in a case in which a corresponding constraint condition is complied with.

FORWARDING NETWORK TRAFFIC ASSOCIATED WITH A SECURITY CLASSIFICATION VIA A ROUTING PATH ASSOCIATED WITH THE SECURITY CLASSIFICATION
20230179633 · 2023-06-08 ·

In some implementations, a network device may determine, based on a routing table, a plurality of routing paths from the network device to another network device, wherein the plurality of routing paths are respectively associated with a plurality of security classifications. The network device may receive network traffic that is destined for the other network device and that is associated with a particular security classification of the plurality of security classifications. The network device may forward the network traffic based on a particular routing path, of the plurality of routing paths, that is associated with the other network device and the particular security classification.

FORWARDING NETWORK TRAFFIC ASSOCIATED WITH A SECURITY CLASSIFICATION VIA A ROUTING PATH ASSOCIATED WITH THE SECURITY CLASSIFICATION
20230179633 · 2023-06-08 ·

In some implementations, a network device may determine, based on a routing table, a plurality of routing paths from the network device to another network device, wherein the plurality of routing paths are respectively associated with a plurality of security classifications. The network device may receive network traffic that is destined for the other network device and that is associated with a particular security classification of the plurality of security classifications. The network device may forward the network traffic based on a particular routing path, of the plurality of routing paths, that is associated with the other network device and the particular security classification.