H04L45/40

Adaptive private network with path maximum transmission unit (MTU) discovery process

Systems and techniques are described for a path maximum transmission unit (MTU) discovery method that allows the sender of IP packets to discover the MTU of packets that it is sending over a conduit to a given destination. The MTU is the largest packet that can be sent through the network along a path without requiring fragmentation. The path MTU discovery method actively probes each sending path of each conduit with fragmentation enabled to determine a current MTU and accordingly increase or decrease the conduit MTU. The path MTU discovery process is resilient to errors and supports retransmission if packets are lost in the discovery process. The path MTU discovery process is dynamically adjusted at a periodic rate to adjust to varying network conditions.

Type-to-type analysis for cloud computing technical components with translation scripts

Cloud computing has emerged as an extremely popular implementation option for a wide range of computing services. However, provisioning services into the cloud is an extremely difficult technical challenge. This is due in part to the regular emergence of new cloud service providers, as well as the routine changing and reconfiguration of the disparate computing platforms, services, assets, supported technical components, and other features offered by the service providers. An analysis architecture determines how to map a particular technical component into the execution environment of any particular service provider with the aid of translation scripts.

Type-to-type analysis for cloud computing technical components with translation through a reference type

Cloud computing has emerged as an extremely popular implementation option for a wide range of computing services. However, provisioning services into the cloud is an extremely difficult technical challenge. This is due in part to the regular emergence of new cloud service providers, as well as the routine changing and reconfiguration of the disparate computing platforms, services, assets, supported technical components, and other features offered by the service providers. An analysis architecture determines how to map a particular technical component into the execution environment of any particular service provider, including translation through a reference type.

Transaction expansion for NoC simulation and NoC design
09928204 · 2018-03-27 · ·

Methods and example implementations described herein are generally directed to interconnect architecture, and more specifically, to generation of one or more expanded transactions for conducting simulations and/or NoC design. Aspects of the present disclosure include processing of input traffic specification that is given in terms of groups of hosts, requests, and responses to the requests, in order to generate one or more appropriate/correct expanded transactions that can be simulated.

Type-to-type analysis for cloud computing technical components

Cloud computing has emerged as an extremely popular implementation option for a wide range of computing services. However, provisioning services into the cloud is an extremely difficult technical challenge. This is due in part to the regular emergence of new cloud service providers, as well as the routine changing and reconfiguration of the disparate computing platforms, services, assets, supported technical components, and other features offered by the service providers. An analysis architecture determines how to map a particular technical component into the execution environment of any particular service provider.

Adaptive private network with geographically redundant network control nodes

Systems and techniques are described which improve performance, reliability, and predictability of networks. Geographically diverse network control nodes (NCNs) are provided in an adaptive private network (APN) to provide backup NCN operations in the event of a failure. A primary NCN node in a first geographic location is operated according to a primary state machine at an NCN active state. A client node is operated according to a client state machine. A secondary NCN node in a second geographic location that is geographically remote from the first geographic location is operated according to a secondary state machine at a standby state. The three state machines operating parallel and upon detecting a change in APN state information, the secondary state machine transitions from the standby state to a secondary active NCN state and the secondary NCN node provides APN timing calibration and control to the client node.

Technical component provisioning using metadata structural hierarchy

Determining placement options for technical components of a specified service is a difficult technical challenge. A metadata architecture addresses, in part, the technical challenge by defining a complex metadata collection and attachment mechanism. In one implementation, the metadata architecture defines metadata domains and obtains descriptive metadata for those domains, e.g., metadata for the technical components from multiple disparate sources and across multiple different characteristics of the technical components. The metadata architecture is linked to the technical components and the metadata architecture injects specific metadata subsets into, e.g., a placement pipeline that determines where the technical components may be placed in the extensive provider/platform/service space.

Communication device event captures
09634911 · 2017-04-25 · ·

A user interaction or a timer event is detected in a communication device. A timestamp is associated with the user interaction or the timer event. In response to detecting the user interaction or the timer event in the communication device, the user interaction or the timer event and the timestamp are stored in a packet log file associated with the communication device. The packet log file can also include a packet trace of packets that are sent to and received by the communication device. This allows the user interactions and/or the timer events to be displayed chronologically in relation to the packets sent to and received by the communication device.

Adaptive Private Network with Path Maximum Transmission Unit (MTU) Discovery Process

Systems and techniques are described for a path maximum transmission unit (MTU) discovery method that allows the sender of IP packets to discover the MTU of packets that it is sending over a conduit to a given destination. The MTU is the largest packet that can be sent through the network along a path without requiring fragmentation. The path MTU discovery method actively probes each sending path of each conduit with fragmentation enabled to determine a current MTU and accordingly increase or decrease the conduit MTU. The path MTU discovery process is resilient to errors and supports retransmission if packets are lost in the discovery process. The path MTU discovery process is dynamically adjusted at a periodic rate to adjust to varying network conditions.

TYPE-TO-TYPE ANALYSIS FOR CLOUD COMPUTING TECHNICAL COMPONENTS WITH TRANSLATION SCRIPTS

Cloud computing has emerged as an extremely popular implementation option for a wide range of computing services. However, provisioning services into the cloud is an extremely difficult technical challenge. This is due in part to the regular emergence of new cloud service providers, as well as the routine changing and reconfiguration of the disparate computing platforms, services, assets, supported technical components, and other features offered by the service providers. An analysis architecture determines how to map a particular technical component into the execution environment of any particular service provider with the aid of translation scripts.