Patent classifications
H04L41/046
Method and system for sizing a cloud desktop fabric
A system and method for a virtual desktop system is disclosed. The system includes a master fabric region including resources for provisioning a desktop. The system includes a plurality of expansion fabric regions. Each of the expansion fabric regions including replicated resources for provisioning the desktop from the master fabric region. The system includes a control plane having a global pool. A client device application operated by a user associated with the global pool accesses a desktop from either the master fabric region or one of the expansion fabric regions. The control plane is operable to add a new expansion fabric region to the plurality of expansion fabric regions or eliminate one of the plurality of expansion fabric regions.
Systems, methods, and apparatuses for implementing persistent management agent (PMA) functions for the control and coordination of DPU and DSLAM components
In accordance with embodiments disclosed herein, an exemplary system or computer implemented method for implementing Persistent Management Agent (PMA) functions for the control and coordination of DPU and DSLAM components may include, for example: a memory to store instructions for execution; one or more processors to execute the instructions; a virtualized module operating on virtualized computing infrastructure, in which the virtualized module is to provide a virtualized implementation of a plurality of functions associated with one or more remotely located Distribution Point Units (DPUs) and/or Digital Subscriber Line Access Multiplexers (DSLAMs), each of the one or more remotely located DPUs and/or DSLAMs having a plurality of broadband lines coupled thereto; in which the virtualized module is to further control Persistent Management Agent (PMA) functions and control coordination of the one or more remotely located DPUs and/or DSLAMs and the plurality of broadband lines coupled with the one or more remotely located DPUs and/or DSLAMs by virtualizing one or more functions of the one or more remotely located DPUs and/or DSLAMs to operate on the virtualized computing infrastructure; and a network interface to receive data and send control instructions for operation of the plurality of broadband lines to and from the one or more remotely located DPUs and/or DSLAMs. Other related embodiments are disclosed.
Systems, methods, and apparatuses for implementing persistent management agent (PMA) functions for the control and coordination of DPU and DSLAM components
In accordance with embodiments disclosed herein, an exemplary system or computer implemented method for implementing Persistent Management Agent (PMA) functions for the control and coordination of DPU and DSLAM components may include, for example: a memory to store instructions for execution; one or more processors to execute the instructions; a virtualized module operating on virtualized computing infrastructure, in which the virtualized module is to provide a virtualized implementation of a plurality of functions associated with one or more remotely located Distribution Point Units (DPUs) and/or Digital Subscriber Line Access Multiplexers (DSLAMs), each of the one or more remotely located DPUs and/or DSLAMs having a plurality of broadband lines coupled thereto; in which the virtualized module is to further control Persistent Management Agent (PMA) functions and control coordination of the one or more remotely located DPUs and/or DSLAMs and the plurality of broadband lines coupled with the one or more remotely located DPUs and/or DSLAMs by virtualizing one or more functions of the one or more remotely located DPUs and/or DSLAMs to operate on the virtualized computing infrastructure; and a network interface to receive data and send control instructions for operation of the plurality of broadband lines to and from the one or more remotely located DPUs and/or DSLAMs. Other related embodiments are disclosed.
Network embedded framework for distributed network analytics
A network analytics controller is established in a network. The network includes a plurality of nodes. A plurality of network analytics agents is established; each agent at a node of the network. Network analytics configuration parameters, including a network analytics scope, are received at the networks analytics controller. A task is assigned to each agent at a node determined to be within the network analytics scope, the task comprising that portion of the network analytics specified in the network analytics configuration parameters relevant to the corresponding node. The assigned task is performed at each agent assigned a task. The networks analytics controller receives the results of each performed task, and aggregates the received results.
Network embedded framework for distributed network analytics
A network analytics controller is established in a network. The network includes a plurality of nodes. A plurality of network analytics agents is established; each agent at a node of the network. Network analytics configuration parameters, including a network analytics scope, are received at the networks analytics controller. A task is assigned to each agent at a node determined to be within the network analytics scope, the task comprising that portion of the network analytics specified in the network analytics configuration parameters relevant to the corresponding node. The assigned task is performed at each agent assigned a task. The networks analytics controller receives the results of each performed task, and aggregates the received results.
Configuring a network
A set of network requirements is received. At least a portion of the set of network requirements is stored on a system data store. Device requirements for a plurality of network devices are stored on the system data store. At least a portion of the stored device requirements is received at a proxy agent. Native hardware instructions are generated based on the received device requirements to configure at least one of the plurality of network devices.
Configuring a network
A set of network requirements is received. At least a portion of the set of network requirements is stored on a system data store. Device requirements for a plurality of network devices are stored on the system data store. At least a portion of the stored device requirements is received at a proxy agent. Native hardware instructions are generated based on the received device requirements to configure at least one of the plurality of network devices.
Unique ID generation for sensors
Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.
Unique ID generation for sensors
Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.
Technologies for assigning workloads to balance multiple resource allocation objectives
Technologies for allocating resources of managed nodes to workloads to balance multiple resource allocation objectives include an orchestrator server to receive resource allocation objective data indicative of multiple resource allocation objectives to be satisfied. The orchestrator server is additionally to determine an initial assignment of a set of workloads among the managed nodes and receive telemetry data from the managed nodes. The orchestrator server is further to determine, as a function of the telemetry data and the resource allocation objective data, an adjustment to the assignment of the workloads to increase an achievement of at least one of the resource allocation objectives without decreasing an achievement of another of the resource allocation objectives, and apply the adjustments to the assignments of the workloads among the managed nodes as the workloads are performed. Other embodiments are also described and claimed.