H04L69/40

SYSTEM AND METHOD FOR DISASTER RECOVERY OF CLOUD APPLICATIONS
20170308446 · 2017-10-26 · ·

Cloud computing is continuously growing as a business model for hosting information and communications technology applications. While the on-demand resource consumption and faster deployment time make this model appealing for the enterprise, other concerns arise regarding the quality of service offered by the cloud. Systems and methods are provided for enabling disaster recovery of applications hosted in the cloud and for monitoring data center sites for failure.

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR OPTIMIZED NETWORK FUNCTION (NF) DISCOVERY AND ROUTING USING SERVICE COMMUNICATIONS PROXY (SCP) AND NF REPOSITORY FUNCTION (NRF)
20220060547 · 2022-02-24 ·

A method for optimized NF discovery and routing includes, at an SCP, receiving a discovery request message or generating a discovery request message in response to a received service request message with a 3gpp-Sbi-Discovery header. The SCP modifies the discovery request message to identify as unhealthy at least one service endpoint and service name combination associated with at least one producer NF instance capable of providing a service identified in the discovery request message or the service request message The SCP forwards the discovery request message to the NRF. The NRF creates a list of service profiles of producer NF instances capable of providing the service identified in the discovery or service request message and excludes, from the list, at least one service profile of the at least one producer NF instance corresponding to the endpoint and service name combinations identified as unhealthy in the discovery request message.

REVERTING ROUTING DECISIONS MADE BASED ON INCORRECT NETWORK PREDICTIONS

In one embodiment, a networking device reroutes traffic in a network from a first path to a second path, based on a prediction that the first path will not satisfy a service level agreement associated with the traffic. The networking device enters a fast monitoring state during which the networking device performs fast probing of the first path and of the second path onto which the traffic was rerouted. The networking device makes, based on the fast probing, a determination as to whether the first path would have violated the service level agreement and whether the second path violates the service level agreement. The networking device enacts a routing decision for the traffic by applying a routing policy to the determination.

MAXIMUM SUSTAINABLE ENCODING BIT RATES FOR VIDEO DOWNLOADS
20170310729 · 2017-10-26 ·

Described embodiments include a system that includes a network interface and a processor. The processor is configured to identify, via the network interface, a state of congestion in a communication channel between a base station belonging to a cellular network and a client device, to calculate, responsively to the state of congestion, a maximum sustainable encoding bit rate (MSEBR) for a video that is being downloaded by the client device, from a server, via the communication channel, the video being encoded at a plurality of different predefined bit rates, and to inhibit the client device, in response to calculating the MSEBR, from downloading a segment of the video that is encoded at any one of the predefined bit rates that exceeds the MSEBR. Other embodiments are also described.

PARITY PROTECTION FOR DATA CHUNKS IN AN OBJECT STORAGE SYSTEM
20170308437 · 2017-10-26 ·

The present invention relates to a method and system for providing parity protection in an object storage system. The present invention allows for tracking the storage requirements for chunks in a distributed storage cluster when transitioning from replica-based protection to parity or erasure coding-based protection and when transitioning from parity or erasure coding-based protection to replica-based protection.

Data Logging in Aerial Platform
20170309088 · 2017-10-26 ·

An unmanned aerial vehicle manages storage of data and transfer between other connected devices. The unmanned aerial vehicle captures sensor data from sensors on the unmanned aerial vehicle. The unmanned aerial vehicle transfers the captured sensor data from the unmanned aerial vehicle to a remote controller via a wireless interface. The captured data may be transferred via a TCP link, a UDP link, or a combination thereof If a loss of link is detected, the captured sensor data is stored to a buffer and a battery level of the unmanned aerial vehicle and a flight status of the unmanned aerial vehicle is monitored. The stored sensor data is transferred from the buffer to a non-volatile storage responsive to the battery level dropping below a predefined threshold or detecting that the unmanned aerial vehicle is stationary and a shutdown may be imminent.

OPERATION METHOD OF A COMMUNICATION NODE IN NETWORK
20170310591 · 2017-10-26 ·

An operation method of a first communication node comprises: receiving a first frame from a second communication node; obtaining a destination address of the first frame; and transmitting a second frame including an indicator for indicating an occurrence of an error in the first frame to a communication node corresponding to a source address of the first frame, when a port corresponding to the destination address does not exist in a routing table.

Establishing And Managing Connections For Real Time Communications

Methods and systems related to supporting real time communications are disclosed. In one type of a real time communication session, prior to an offer and acceptance to perform real time communications, a communication channel may be established between a caller device and a callee device. Information related to addresses of the caller and callee devices can be contained in, or pointed to, by a Universal Resource Locators (URLs) for the caller and callee devices. A network computing device may communicate messages relating to establishing and maintaining the communication channel between the caller and callee devices. In a scenario where the network computing device becomes unavailable, another network computing device can use the URLs and other channel information that may be stored in the database, to handle messages. In one embodiment, messages identify the caller or callee devices, to which each message is directed, using target URLs (caller and callee URLs), which reduces the need to access information related to the intended target.

Automatic data request recovery after session failure

Techniques for recovering from session failures between clients and database servers are described herein. A first session may be established between a client and a first database server to handle a database query for the client. A request for data associated with the first session may be received by the first database server from the client, and the data retrieved. Prior to responding to the request, the data is spooled to a first session state stored in a repository made accessible by at least one computing device. The computing device(s) controls access to session states in the repository that correspond to sessions between clients and database servers. The computing device(s) enables sessions to be reestablished between the clients and database servers by accessing data of the session states in the repository and transmitting the data in response to messages received from the database servers containing session identifiers.

Policy control method and apparatus for terminal peripheral

Provided are a policy control method and device for one or more terminal peripherals. The method includes: an M2M gateway executing one or more operations for one or more terminal peripherals according to a transaction trigger condition in policy definition, wherein the one or more operations for the one or more terminal peripherals are one or more operations corresponding to the transaction trigger condition in the policy definition. The solution solves the technical problem in the related art that it is impossible to implement control for one or more terminal peripherals through the M2M gateway according to the policy definition, which implements policy control of one or more terminal peripherals through the M2M gateway and improves the intelligent degree of an M2M system.