H04L41/122

Network monitoring tool for supercomputers

Disclosed herein are embodiments of a network monitoring device for a supercomputer system having a plurality of supercomputer nodes. The network monitoring device may utilize plug-in software modules to provide network monitoring capabilities related to discovering the network topologies of the supercomputer system, determining network and computing resources that are available for new applications in the supercomputer system, collecting network and computing resources that are being used by running software applications in the supercomputer system, and monitoring running software applications on the supercomputer system.

Managing a cloud-based distributed computing environment using a distributed database
11470146 · 2022-10-11 · ·

The disclosed embodiments disclose techniques for managing a cloud-based distributed computing environment (CBDCE) that comprises multiple geographically-distributed compute nodes. Multiple services simultaneously execute on the CBDCE compute nodes, with each service comprising multiple service instances that simultaneously execute on multiple distinct compute nodes of the CBDCE. During operation, the system uses a distributed database to track the status of the CBDCE to ensure the ongoing stability and scalability of the CBDCE. Upon receiving a request that is associated with the configuration of the CBDCE, a service accesses CBDCE status information from the distributed database to respond to the request.

Service insertion in public cloud environments
11627080 · 2023-04-11 · ·

Example methods are provided a network device to perform service insertion in a public cloud environment that includes a first virtual network and a second virtual network. In one example method, in response to receiving a first encapsulated packet from a first virtualized computing instance located in the first virtual network, the network device may generate a decapsulated packet by performing decapsulation to remove, from the first encapsulated packet. The method may also comprise identifying a service path specified by a service insertion rule, and sending the decapsulated packet to the service path to cause the service path to process the decapsulated packet according to one or more services. The method may further comprise: in response to the network device receiving the decapsulated packet processed by the service path, sending the decapsulated packet, or generating and sending a second encapsulated packet, towards a destination address.

Determining network topology based on packet traffic
11606258 · 2023-03-14 · ·

In some implementations, a method is provided. The method includes receiving captured packet traffic, the captured packet traffic including a plurality of packets transmitted over a network. One or more communication patterns for each of one or more levels in a network stack are detected based on metadata of the captured packet traffic, each communication pattern indicating communication between two components in the network. The method further includes generating a topology of the network in view of the one or more communication patterns detected for each of the one or more levels in the network stack.

Providing recommendations for implementing virtual networks

Some embodiments provide a novel method for deploying different virtual networks over several public cloud datacenters for different entities. For each entity, the method (1) identifies a set of public cloud datacenters of one or more public cloud providers to connect a set of machines of the entity, (2) deploys managed forwarding nodes (MFNs) for the entity in the identified set of public cloud datacenters, and then (3) configures the MFNs to implement a virtual network that connects the entity's set of machines across its identified set of public cloud datacenters. In some embodiments, the method identifies the set of public cloud datacenters for an entity by receiving input from the entity's network administrator. In some embodiments, this input specifies the public cloud providers to use and/or the public cloud regions in which the virtual network should be defined. Conjunctively, or alternatively, this input in some embodiments specifies actual public cloud datacenters to use.

Network virtualization platforms enhanced with non-visual sensory interactivity

Concepts and technologies disclosed herein are directed to visualization for network virtualization platforms (“NVPs”) enhanced with non-visual sensory interactivity. A computer system can obtain data associated with an NVP. The computer system can generate a non-visual feedback environment representative of at least a portion of the network virtualization platform. The non-visual feedback environment can include non-visual sensory feedback to be presented to a user. The computer system also can receive one or more rules associated with the data. The rule(s) can be associated with one or more service elements of the NVP. The rule(s) alternatively or additionally can be associated with one or more events. The computer system can provide the non-visual sensory feedback via a non-visual sensory feedback device that outputs the non-visual sensory feedback to be sensed by the user. The non-visual sensory feedback can include audio feedback, haptic feedback, olfactory feedback, or some combination thereof.

Network control in artificial intelligence-defined networking

A system including one or more processors and one or more non-transitory computer-readable media storing computing instructions that, when executed on the one or more processors, perform certain acts. The acts can include receiving a deployment model selection of a software-defined-network (SDN) control service. The deployment model selection includes one of a centralized model, a decentralized model, a distributed model, or a hybrid model. The acts also can include deploying the SDN control service in the deployment model selection to control a physical computer network. The SDN control service uses a routing agent model trained using a reinforcement-learning model. Other embodiments are described.

Managing Virtual Networks of Virtual Machines Using Telecommunications Infrastructure Systems

Techniques are described for providing logical networking functionality for managed computer networks, such as for virtual computer networks provided on behalf of users or other entities. In some situations, a user may configure or otherwise specify a network topology for a virtual computer network, such as a logical network topology that separates multiple computing nodes of the virtual computer network into multiple logical sub-networks and/or that specifies one or more logical networking devices for the virtual computer network. After a network topology is specified for a virtual computer network, logical networking functionality corresponding to the network topology may be provided in various manners, such as without physically implementing the network topology for the virtual computer network. In some situations, the computing nodes may include virtual machine nodes hosted on one or more physical computing machines or systems, such as by or on behalf of one or more users.

TECHNIQUES FOR MANAGING LONG-RUNNING TASKS WITH A DECLARATIVE PROVISIONER

Techniques for implementing an infrastructure orchestration service are described. In some examples, a declarative provisioner of the infrastructure orchestration service receives instructions for deployment of a resource. The declarative provisioner identifies that the deployment of the resource is a long-running task stores state information corresponding to the deployment of the resource. In certain embodiments, upon identifying that the deployment of the resource is a long-running task, the declarative provisioner pauses its execution of the long-running task. Responsive to a trigger received from the infrastructure orchestration service, the declarative provisioner resumes execution of the deployment of the resource using the state information and transmits deployment information corresponding to the deployment of the resource to the infrastructure orchestration service.

Determining formal models using weighting factors for computing elements in multi-domain environments

Techniques for deploying, monitoring, and modifying network topologies operating across multi-domain environments using formal models and weighting factors assigned to computing elements in the network topologies. The weighting factors restrict or allow the movement of various computing elements and/or element groupings to prevent undesirable disruptions or outages in the network topologies. Generally, the weighting factors may be determined based on an amount of disruption experienced in the network topologies if the corresponding computing element or grouping was migrated. As the amount of disruption caused by modifying a particular computing element increases, the weighting factor represents a greater measure of resistivity for migrating the computing element. In this way, topology deployment systems may allow, or disallow, the modification of particular computing elements based on weighting factors. Thus, the amount of disruption in the functioning of network topologies may be considered when optimizing the allocation of computing elements across multi-domain environments.