Patent classifications
H04L47/74
Systems and methods for end point data communications anonymization for a communications hub
A method for end point data communications anonymization for a local communications hub is provided. The method commences with receiving a first request addressed to a server from a computing device. The method further includes selecting a first remote communications hub from a plurality of remote communications hubs. The method continues with modifying the first request to generate a first modified request and sending the first modified request to the first remote communications hub. The first remote communications hub modifies the first modified request to produce a second modified request and forwards the second modified request to the server. The method further includes receiving a first response to the second modified request from the server, modifying the received first response to produce a first modified response, modifying the first modified response to produce a second modified response, and providing the second modified response to the computing device.
Bandwidth Awareness in a Link Aggregation Group
In one embodiment, a method includes receiving a request to establish a path for a data stream from the first network apparatus to a second network apparatus, where the request is associated with a requested bandwidth for the data stream, and where the first network apparatus and the second network apparatus are connected by a link aggregation group including a number of physical Ethernet links, accessing bandwidth information representing a number of remaining bandwidths of the respective multiple of physical Ethernet links, determining that the requested bandwidth is not satisfied by any of the number of remaining bandwidths of the number of physical Ethernet links, and sending a response rejecting the request to establish the path.
Bandwidth Awareness in a Link Aggregation Group
In one embodiment, a method includes receiving a request to establish a path for a data stream from the first network apparatus to a second network apparatus, where the request is associated with a requested bandwidth for the data stream, and where the first network apparatus and the second network apparatus are connected by a link aggregation group including a number of physical Ethernet links, accessing bandwidth information representing a number of remaining bandwidths of the respective multiple of physical Ethernet links, determining that the requested bandwidth is not satisfied by any of the number of remaining bandwidths of the number of physical Ethernet links, and sending a response rejecting the request to establish the path.
PROTECTING INTEGRATION BETWEEN RESOURCES OF DIFFERENT SERVICES USING SERVICE-GENERATED DEPENDENCY TAGS
A resource tag service of a provider network may be used to protect integration between resources of different services by generating dependency tags. When a service receives, from a client, a request for a resource of the service to use another resource of another service, a dependency tag is generated by the resource tag service. The dependency tag indicates that the resource depends on the other resource (e.g., the resources are integrated). When the other service receives, from the client, a request to delete or modify the other resource, the deletion or modification of the other resource is prevented based on the existence of the dependency tag for the other resource (e.g., the dependency tag is attached to the other resource, indicating that the other resource of the other service is integrated with the resource of the service).
Methods and apparatuses for providing internet-based proxy services
A proxy server receives from a client network application a request for an action to be performed on an identified network resource of a domain of an origin server. The request is received at the proxy server as a result of a DNS request for the domain returning an IP address of the proxy server. The proxy server determines that the first request is indicative of being from a bot. Responsive to this determination, the proxy server transmits a block page to the client network application that includes a mechanism to allow a human user of the client network application to provide input that indicates that they are human and not a bot. If the proxy server does not receive input from the client network application through the mechanism in the block page that indicates that the first request is not from a bot, the proxy server blocks the request.
Data feed resource reservation system
An embodiment of a method includes receiving a subscription request specifying one or more destination sites to receive a video feed and respective times at which to deliver the video feed to each of the one or more destination sites over a terrestrial network, wherein respective delivery times are within a publication time range in which the video feed will be available, and configuring available resources to deliver the requested video feed to the one or more destination sites at the respective times.
Dynamic allocation of bandwidth to virtual network ports
A disclosed method and system for allocating bandwidth among a plurality of virtual network ports assigned to a plurality of virtual machines accesses assignment information indicating which virtual network ports are assigned to which virtual machines. A network bandwidth manager (NBM) receives network utilization information indicating the network utilization of each virtual network port/The NBM further receives virtual machine priority information indicative of a derived priority for each of the plurality of virtual machines. The NBM configures bandwidth parameters for each of the virtual network ports based on the assignment information, network utilization information, and the virtual machine priority information.
Method and apparatus for adjusting network flow
A method and apparatus for adjusting network flow are provided. An embodiment of the method may include: in response to the server meeting a network flow adjustment condition, acquiring network flow-related information of the server; determining network flow adjustment operations based on the network flow-related information, wherein the network flow adjustment operations indicate to determine at least one level of downlink flow from a plurality of levels of downlink flows according to an ascending order of the plurality of levels of downlink flows, to perform network flow downregulation on the determined at least one level of downlink flow, the at least one level not comprising a highest level in the plurality of levels, and in any two levels of downlink flows, a value of a downlink flow of a higher level being greater than a value of a downlink flow of a lower lever; and performing, according to a sequential order of operations in the network flow adjustment operations, at least one operation in the network flow adjustment operations.
Beam failure detection when control resource set beam is updated
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may receive a beam update message identifying a change from a first control resource set (CORESET) beam to a second CORESET beam. The UE may use, for a beam failure detection (BFD) procedure, a first BFD reference signal associated with the first CORESET beam or a second BFD reference signal associated with the second CORESET beam based at least in part on one or more selection criteria. Numerous other aspects are provided.
Internet-based proxy service to modify internet responses
A proxy server receives from a client device a request for a network resource that is hosted at an origin server for a domain. The request is received at the proxy server as a result of a DNS request for the domain resolving to the proxy server. The origin server is one of multiple origin servers that belong to different domains that resolve to the proxy server and are owned by different entities. The proxy server retrieves the requested network resource. The proxy server determines that the requested resource is an HTML page, automatically modifies the HTML page, and transmits the modified HTML page to the client device.