Patent classifications
H04L47/76
PER-INTERFACE ACCESS CONTROL LIST (ACL) COUNTER
Systems and methods for allocating a per-interface access control list (ACL) counter are disclosed. An ACL is applied to a data packet received at an interface of the network element. In response to matching the highest priority ACL rule, a counter value is obtained based on a combination of a base index and an expansion index value. The base index, expansion index, and counter values are stored in their respective tables. The counter value is uniquely associated with the specific ACL rule hit and the interface used to receive the data packet. Systems and methods also allocate a next set of expansion and counter tables when their storage capacity is exceeded. When the next set of tables are allocated, the older set of tables along with their index mappings and entries are preserved.
Dynamically configurable networking device interfaces for directional capacity modifications
Directional capacity of interfaces for networking devices are dynamically modified. Network traffic utilization of one direction of a network interface may be determined. A modification to a capacity of the networking device to process network traffic in the one direction of the network may be determined. The modification may then be applied to the networking device so that subsequent network traffic is processed according to the modified capacity in the one direction of the interface.
Dynamically configurable networking device interfaces for directional capacity modifications
Directional capacity of interfaces for networking devices are dynamically modified. Network traffic utilization of one direction of a network interface may be determined. A modification to a capacity of the networking device to process network traffic in the one direction of the network may be determined. The modification may then be applied to the networking device so that subsequent network traffic is processed according to the modified capacity in the one direction of the interface.
Slice management system and slice management method
An object is to provide a slice management system capable of assigning slices to a plurality of business operators. In a parent SMF 100, a slice management table 103 can manage resources of a slice managed by a child SMF 100a or the like, and a communication unit 101 can notify the child SMF 100a or the like of the resources. The child SMF 100a or the like receives the resources and stores the resources in the slice management table 106. Therefore, the child SMF 100a or the like can manage the resources of the slice managed by the child SMF 100a or the like, and the child SMF 100a can independently enable the management of the resources.
Systems and methods for dynamic adjustment of workspaces based on available local hardware
Systems and methods adjust workspaces based on available hardware resource of an IHS (Information Handling System) by which a user operates a workspace supported by a remote orchestration service. A security context and a productivity context of the IHS are determined based on reported context information. A workspace definition for providing access to a managed resource is selected based on the security context and the productivity context. A notification specifies a hardware resource of the IHS that is not used by the workspace definition, such as a microphone or camera that has not been enabled for use by workspaces. A productivity improvement that results from the updated productivity context that includes use of the first hardware resource is determined. Based on the productivity improvement, an updated workspace definition is selected that includes use of the first hardware resource in providing access to the managed resource via the IHS.
Systems and methods for dynamic adjustment of workspaces based on available local hardware
Systems and methods adjust workspaces based on available hardware resource of an IHS (Information Handling System) by which a user operates a workspace supported by a remote orchestration service. A security context and a productivity context of the IHS are determined based on reported context information. A workspace definition for providing access to a managed resource is selected based on the security context and the productivity context. A notification specifies a hardware resource of the IHS that is not used by the workspace definition, such as a microphone or camera that has not been enabled for use by workspaces. A productivity improvement that results from the updated productivity context that includes use of the first hardware resource is determined. Based on the productivity improvement, an updated workspace definition is selected that includes use of the first hardware resource in providing access to the managed resource via the IHS.
UTILIZING A MODEL TO MANAGE RESOURCES OF A NETWORK DEVICE AND TO PREVENT NETWORK DEVICE OVERSUBSCRIPTION BY ENDPOINT DEVICES
A network device may receive configuration data identifying resource subscription thresholds associated with a plurality of respective endpoint devices and may receive traffic from the plurality of endpoint devices. The network device may process the traffic and the configuration data, with a resource allocation model, to determine that processing traffic associated with a first endpoint device requires allocating a resource of the network device, and may process the configuration data, with the resource allocation model, to identify the resource of the network device from a particular resource of the network device that is currently allocated to traffic associated with a second endpoint device. The network device may allocate the particular resource of the network device to the traffic associated with the first endpoint device, and may process the traffic associated with the first endpoint device with the particular resource to generate processed traffic.
METHOD AND SYSTEM FOR FACILITATING LOSSY DROPPING AND ECN MARKING
Methods and systems are provided for performing lossy dropping and ECN marking in a flow-based network. The system can maintain state information of individual packet flows, which can be set up or released dynamically based on injected data. Each flow can be provided with a flow-specific input queue upon arriving at a switch. Packets of a respective flow are acknowledged after reaching the egress point of the network, and the acknowledgement packets are sent back to the ingress point of the flow along the same data path. As a result, each switch can obtain state information of each flow and perform per-flow packet dropping and ECN marking.
Multi-level video processing within a vehicular communication network
A system for controlling power distribution within a vehicular communication network, including a power source equipment comprising a first port in communication with a network node module of a device, and a Power over Ethernet (POE) management module. The POE management module is configured to enable POE to the device via the first port, monitor a current draw of the device, determine whether the current draw of the device exceeds a threshold, and disable POE to the device, responsive to determining that the current draw exceeds the threshold.
Multi-level video processing within a vehicular communication network
A system for controlling power distribution within a vehicular communication network, including a power source equipment comprising a first port in communication with a network node module of a device, and a Power over Ethernet (POE) management module. The POE management module is configured to enable POE to the device via the first port, monitor a current draw of the device, determine whether the current draw of the device exceeds a threshold, and disable POE to the device, responsive to determining that the current draw exceeds the threshold.