Patent classifications
H04J1/16
MEMORY-EFFICIENT TECHNIQUE FOR WEIGHTED ROUND-ROBIN LOAD BALANCING
A memory-efficient technique for performing weighted round-robin load balancing in a distributed computing system is described. In one example of the present disclosure, a system can determine an offset to apply to a list of node identifiers based on a counter value. The system can select a subset of node identifiers from the list of node identifiers based on the offset. The system can then select a node identifier from the subset of node identifiers based on the counter value and a length of the subset of node identifiers. The system can transmit data to a node that corresponds to the node identifier and increment the counter value. The system can repeat this process any number of times to distribute data among a group of nodes in the distributed computing system.
Methods and systems of an all purpose broadband network with publish subscribe broker network
A first optimization server including a first publish-subscribe broker is configured to connect to a first cellular base transceiver station, where the first cellular base transceiver station is configured to communicatively connect to entities, including a first entity, in an RF coverage area of the first cellular base transceiver station. A second optimization server includes a second publish-subscribe broker, where the first publish-subscribe broker and the second publish-subscribe broker are part of a publish-subscribe broker network that is operable to distribute published data packets between entities that are connected to a publish-subscribe broker of the publish-subscribe broker network, where the publish-subscribe broker network is configured to route data packets published by the first entity to a second entity via the first publish-subscribe broker and the second publish-subscribe broker if the second entity has subscribed to receive the data packets published by the first entity.
Methods and systems of an all purpose broadband network with publish subscribe broker network
A first optimization server including a first publish-subscribe broker is configured to connect to a first cellular base transceiver station, where the first cellular base transceiver station is configured to communicatively connect to entities, including a first entity, in an RF coverage area of the first cellular base transceiver station. A second optimization server includes a second publish-subscribe broker, where the first publish-subscribe broker and the second publish-subscribe broker are part of a publish-subscribe broker network that is operable to distribute published data packets between entities that are connected to a publish-subscribe broker of the publish-subscribe broker network, where the publish-subscribe broker network is configured to route data packets published by the first entity to a second entity via the first publish-subscribe broker and the second publish-subscribe broker if the second entity has subscribed to receive the data packets published by the first entity.
Reservation-Based Resource Configuration for Dynamic Workspaces
Reservations of resources within a dynamic workspace are made and facilitated including by pushing configurations specific to a worker for whom a reservation is made to the resource for a limited time period for the reservation. When the worker arrives for the reservation and checks in, configurations associated with the worker are obtained and pushed to the resource to configure the resource for use by the worker for a time period of the reservation. In some cases, an identity of the worker may be verified to complete the check in process for the reservation. In response to an end time of the reservation being determined, such as based on a scheduled end time for the reservation or based on a determination that the resource has gone unused for some amount of time, the configurations are removed from the resource to prepare the resource for use by a next worker.
SYSTEMS AND METHODS FOR DETERMINING PROBLEMATIC PATHS BETWEEN INTEREST POINTS IN A MULTI-CLOUD ENVIRONMENT
In one embodiment, a method includes identifying a problematic event between a first interest point and a second interest point of a network and activating, in response to identifying the problematic event between the first interest point and the second interest point, a first endpoint associated with the first interest point and a second endpoint associated with the second interest point. The method also includes receiving, from the first endpoint and the second endpoint, telemetry data associated with a problematic path between the first interest point and the second interest point. The method further includes determining the problematic path between the first interest point and the second interest point using the telemetry data received from the first endpoint and the second endpoint.
NETWORK INTERFACE WITH RESOURCE COORDINATOR
An integrated circuit includes: a processor; a receiver coupled to the processor; and memory coupled to the processor. The memory stores resource coordinator instructions that, when executed by the processor, cause the processor to: maintain a plurality of active secure sessions; identify a priority session trigger; and allocate receiver resources for incoming packets related to the plurality of active secure sessions based on the priority session trigger.
ADAPTIVE CONTROL PLANE POLICING
Techniques are described for an adaptive CoPP that can adapt and change based on actual network control traffic rather than static CoPP rates. An aggressive CoPP can protect the CPU (route processor) of a network device, e.g., routers and switches, but may also penalize convergence and performance. An adaptive CoPP may protect CPU as well as boost convergence and performance parameters. In particular, traffic between two sites may be managed by proactively changing the thresholds of lower CoS traffic based on the CoPP utilization of various protocol/BPDU class traffic, thereby improving data plane convergence and application performance in scaled environments.
EFFICIENT FLOW MANAGEMENT UTILIZING UNIFIED LOGGING
Techniques are disclosed for a smart network interface card (smartNIC) performing a unified logging process. In one example, an accelerator of the smartNIC receives a packet that is a candidate for rejection, whereby the accelerator is configured to log traffic for authorized flows that are forwarded by the accelerator to another device. The accelerator transmits the packet to a programming data plane of the smartNIC for further processing. The programming data plane determines that the packet should not be forwarded by the smartNIC, and modifies the packet to include an instruction that instructs the accelerator to log the packet. The programming data plane then transmits the modified packet to the accelerator. Upon receiving the modified packet, the accelerator logs the packet to the unified log based on the instruction.
EXIT INTERFACE SELECTION BASED ON INTERMEDIATE PATHS
Systems, methods, and computer-readable media are provided for performing secure frame encryption as a service. For instance, a network edge device can determine at least a first path and a second path for routing a data packet. The network edge device can obtain a first plurality of values for at least one network metric, wherein the first plurality of values corresponds to the first path and at least a first backup path associated with the first path. The network edge device can obtain a second plurality of values for the at least one network metric, wherein the second plurality of values corresponds to the second path and at least a second backup path associated with the second path. The network edge device can select one of the first path or the second path for routing the data packet based on a comparison of the first plurality of values and the second plurality of values.
Base station apparatus, control method, and control program for switching a channel according to a priority of beacons
A base station apparatus includes a first wireless communication unit configured to transmit a first beacon for performing wireless communication in a first channel, a second wireless communication unit configured to transmit a second beacon for performing wireless communication in a second channel, and a control unit configured to switch a channel in which the first beacon is transmitted to the second channel when a radar wave is detected in the first channel.