H04L47/74

Core network node, user equipment and methods in a packet communications network

A method performed by a core network node for handling a data service session in a packet communication network is provided. The packet communication network is configured to support fixed access between a User Equipment (UE) and an access network node. The core network node obtains a decision whether a monitored bandwidth over the fixed access is below a bandwidth requirement authorized to the UE. The bandwidth over the fixed access is monitored for a data service session between the UE and the Data Network via the fixed access. The core network node obtains a decision of how to handle the data service session based on the decision whether the monitored bandwidth over the fixed access is below the bandwidth requirement.

Intelligent content server handling of client receipt disruptions
11546212 · 2023-01-03 · ·

An electronic device (such as an origin server) in a content delivery system performs intelligent content server handling of client receipt disruptions. The electronic device may receive requests for segments of a content asset submitted using a manifest that has segment request addresses with session identifiers, estimate a session interruption using the requests and the session identifiers, and handle the session interruption. The electronic device may handle the session interruption by scheduling a recording of the content asset, reallocating network resources, and so on. In some examples, the electronic device may also provide the manifest.

Intelligent content server handling of client receipt disruptions
11546212 · 2023-01-03 · ·

An electronic device (such as an origin server) in a content delivery system performs intelligent content server handling of client receipt disruptions. The electronic device may receive requests for segments of a content asset submitted using a manifest that has segment request addresses with session identifiers, estimate a session interruption using the requests and the session identifiers, and handle the session interruption. The electronic device may handle the session interruption by scheduling a recording of the content asset, reallocating network resources, and so on. In some examples, the electronic device may also provide the manifest.

REREGISTRATION DURING NETWORK SLICE FAILURE

A control system enables re-registration of user equipment (UE) on an alternative network in the event of a partial failure of a network (VPLMN) for wireless communication. An access and mobility management function (AMF) manages the communication to user equipment (UE) via network slices (1,2,3). A slice priority management function (SPM) receives data indicative of a change in the network's ability to maintain the instantiated network slices and determines to reduce services via affected network slices. Before said slice reduction, the access and mobility management function is informed and sends a slice reduction message to the user equipment. In the UE an alternate network selection function (ANSF) receives the slice reduction message and selects an alternate network based on the user information (USIM) and the slice reduction information, and triggers registration on the selected alternate network for transferring at least part of the affected services to a network slice of the selected alternate network.

Slice management system and slice management method

An object is to provide a slice management system capable of assigning slices to a plurality of business operators. In a parent SMF 100, a slice management table 103 can manage resources of a slice managed by a child SMF 100a or the like, and a communication unit 101 can notify the child SMF 100a or the like of the resources. The child SMF 100a or the like receives the resources and stores the resources in the slice management table 106. Therefore, the child SMF 100a or the like can manage the resources of the slice managed by the child SMF 100a or the like, and the child SMF 100a can independently enable the management of the resources.

Differential overbooking in a cloud computing environment

Techniques for differential overbooking on a cloud database. These techniques may include determining a reservation amount of a multi-tenant resource for a first service of a based upon an overbooking characteristic of the first service, and determining that a total usage value of the multi-tenant resource by a plurality of services is greater than a threshold value. In addition, the techniques may include determining a service usage value of the multi-tenant resource by the first service, determining a first overage value of the first service based on the service usage value and the reservation amount, and performing a resource reclamation process over the multi-tenant resource based on the first overage value of the first service.

SYSTEMS AND METHODS FOR SERVER LOAD BALANCING
20230057832 · 2023-02-23 · ·

Methods and systems for balancing online stores across servers. Monitoring a level of customer activity associated with a particular online store in a plurality of online stores. Detecting, based on the level of customer activity, a demand-level condition for the particular online store. Responsive to the detecting of the demand-level condition for the particular online store, moving one or more of the plurality of online stores from a first server of a plurality of servers to a second server of the plurality of servers.

Network service management device, network service management method, and network service management program

[Problem] A lead time for providing a network service can be shortened. [Solution] A network service management apparatus 100 that uses resources included in a network functions virtualization infrastructure 140 to provide a network service includes an orchestrator 110 that defines resources that satisfy a resource requirement of a virtual network function constituting the network service and are allocated to the virtual network function, and reserves the resources, and a virtualized infrastructure manager 130 that secures the reserved resources, activates the virtual network function on the secured resources, and generates the network service. When the securing of the reserved resources fails, the orchestrator 110 re-reserves resources to replace the reserved resources, and the virtualized infrastructure manager 130 secures the re-reserved resources, and activates the virtual network functions on the secured resources.

Technologies for providing hardware resources as a service with direct resource addressability

Technologies for providing hardware resources as a service with direct resource addressability are disclosed. According to one embodiment of the present disclosure, a device receives a request to access a destination accelerator device in an edge network, the request specifying a destination address assigned to the destination accelerator device. The device determines, as a function of the destination address, a location of the destination accelerator device and sends the request to the destination accelerator device.

Technologies for providing hardware resources as a service with direct resource addressability

Technologies for providing hardware resources as a service with direct resource addressability are disclosed. According to one embodiment of the present disclosure, a device receives a request to access a destination accelerator device in an edge network, the request specifying a destination address assigned to the destination accelerator device. The device determines, as a function of the destination address, a location of the destination accelerator device and sends the request to the destination accelerator device.