H04L47/74

Multi-tenant resource management in a gateway

Described herein are systems, methods, and software to manage resources in a gateway shared by multiple tenants. In one example, a system may monitor usage of resources by a tenant of the gateway and compare the usage with usage limits associated with the resources. The system may further determine when the usage of a resource exceeds a usage limit associated with the resource and, when the usage of the resource exceeds the usage limit, identify an operation associated with causing the usage limit to be exceeded and blocking the operation.

Using distributed services to continue or fail requests based on determining allotted time and processing time

After a service receives a request from another service, the service determines an amount of time to process the request by the service as well as a remaining time allotment to complete processing the request (e.g., a timeout value). Based on the remaining time allotment and the amount of time to process the request by at least the service (predicted time or actual time), the service may determine whether to continue processing the request (e.g., by the service and/or one or more subsequent services) or fail the request. In response, the service may then continue processing the request (e.g., continue processing at the service itself or propagate the request to the next service), or the service may fail the request.

Network access method and terminal
11469980 · 2022-10-11 · ·

A network access method and a terminal relate to the communications field, where the method includes obtaining, by the terminal, a priority of a first network service, determining, by the terminal according to a relationship between a network service priority and a network service class, a network service class required for performing the first network service, where the relationship is stored in the terminal, obtaining, by the terminal, a network service class of a first network currently accessed by the terminal, accessing, by the terminal, a second network whose network service class is higher than the network service class of the first network when the network service class of the first network is lower than the network service class required for performing the first network service, and performing the first network service using the second network.

Network access method and terminal
11469980 · 2022-10-11 · ·

A network access method and a terminal relate to the communications field, where the method includes obtaining, by the terminal, a priority of a first network service, determining, by the terminal according to a relationship between a network service priority and a network service class, a network service class required for performing the first network service, where the relationship is stored in the terminal, obtaining, by the terminal, a network service class of a first network currently accessed by the terminal, accessing, by the terminal, a second network whose network service class is higher than the network service class of the first network when the network service class of the first network is lower than the network service class required for performing the first network service, and performing the first network service using the second network.

Systems and methods for managing streams of packets via intermediary devices

Virtual application and desktop delivery may be optimized by supplying application metadata and user intent to the device between a client and a server hosting resources for the delivery. The data packets used to deliver the virtual application or desktop may be also tagged with references to the application. By supplying the metadata and tagging packets with the metadata, an intermediary network device may provide streams of data packets at the target QoS. In addition, the device may apply network resource allocation rules (e.g., firewalls and QoS configuration) for redirected content retrieved by the client out of band relative to a virtual channel such as the Internet. The network resource allocation rules may differ for different types of resources accessed. The device may also control a delivery agent on the server to modify communication sessions established through the virtual channels based on network conditions.

Bandwidth awareness in a link aggregation group

In one embodiment, a method includes receiving a request to establish a path for a data stream from the first network apparatus to a second network apparatus, where the request is associated with a requested bandwidth for the data stream, and where the first network apparatus and the second network apparatus are connected by a link aggregation group including a number of physical links, accessing bandwidth information representing a number of remaining bandwidths of the respective multiple of physical links, determining that the requested bandwidth is not satisfied by any of the number of remaining bandwidths of the number of physical links, and sending a response rejecting the request to establish the path.

Bandwidth awareness in a link aggregation group

In one embodiment, a method includes receiving a request to establish a path for a data stream from the first network apparatus to a second network apparatus, where the request is associated with a requested bandwidth for the data stream, and where the first network apparatus and the second network apparatus are connected by a link aggregation group including a number of physical links, accessing bandwidth information representing a number of remaining bandwidths of the respective multiple of physical links, determining that the requested bandwidth is not satisfied by any of the number of remaining bandwidths of the number of physical links, and sending a response rejecting the request to establish the path.

EVALUATING OVERALL NETWORK RESOURCE CONGESTION BEFORE SCALING A NETWORK SLICE

A first network node in a communication network can evaluate whether to scale a first resource of a network slice of the communication network. The first network node can receive, from a second network node of the communication network, a first message indicating a request for approval to scale the first resource of the network slice. Responsive to receiving the first message, the first network node can determine whether to scale the first resource of the network slice based on information regarding a second resource. The first and second resources may be of different types. The first network node can transmit, to the second network node, a second message indicating whether to scale the first resource of the network slice based on determining whether to scale the first resource of the network slice. Related methods are also discussed.

EVALUATING OVERALL NETWORK RESOURCE CONGESTION BEFORE SCALING A NETWORK SLICE

A first network node in a communication network can evaluate whether to scale a first resource of a network slice of the communication network. The first network node can receive, from a second network node of the communication network, a first message indicating a request for approval to scale the first resource of the network slice. Responsive to receiving the first message, the first network node can determine whether to scale the first resource of the network slice based on information regarding a second resource. The first and second resources may be of different types. The first network node can transmit, to the second network node, a second message indicating whether to scale the first resource of the network slice based on determining whether to scale the first resource of the network slice. Related methods are also discussed.

Systems and methods for end point data communications anonymization for a communications hub

A method for end point data communications anonymization for a local communications hub is provided. The method commences with receiving a first request addressed to a server from a computing device. The method further includes selecting a first remote communications hub from a plurality of remote communications hubs. The method continues with modifying the first request to generate a first modified request and sending the first modified request to the first remote communications hub. The first remote communications hub modifies the first modified request to produce a second modified request and forwards the second modified request to the server. The method further includes receiving a first response to the second modified request from the server, modifying the received first response to produce a first modified response, modifying the first modified response to produce a second modified response, and providing the second modified response to the computing device.