H04L47/78

CLOUD DATA CENTER TENANT-LEVEL OUTBOUND RATE LIMITING METHOD AND SYSTEM

A cloud data center tenant-level outbound rate limiting method includes: starting a timer, receiving and generating statistics of outbound packets of tenants in a current period, obtaining local traffic rate information of the tenants based on all the outbound packets of the tenants in the current period, and generating local bandwidth demand frames of the tenants based on the local traffic rate information of the tenants; when a timing of the timer reaches the end of the current period, sending the local bandwidth demand frames of the tenants to a switch; receiving a global bandwidth demand frame sent by the switch, and computing bandwidth budgets of the tenants based on the local traffic rate information of the tenants and the global bandwidth demand frames of the tenants; modifying rate limiting parameters, and limiting the rate of the outbound packets of the tenants in a next period.

Method for configuring bandwidth part in wireless communication system and device for supporting same

Disclosed in various embodiments are a method for configuring a bandwidth part in a wireless communication system, and a device for supporting same. As one specific example, disclosed in various embodiments are: a method by which a device identifies, confirms, or configures an initial bandwidth part in a wireless communication system; and a device for supporting same.

SYSTEM FOR TRIGGERING ADAPTIVE RESOURCE CHANNEL REQUISITION WITHIN A DISTRIBUTED NETWORK

Systems, computer program products, and methods are described herein for triggering adaptive resource channel requisition within a distributed network. The present invention is configured to electronically receive, from a user input device, a resource allocation request from a user; retrieve, from the resource allocation request, information associated with the user; trigger an adaptive resource channel requisition (ARCR) engine on the request based on at least the information associated with the user; retrieve, from the resource allocation request one or more preset value associated with resource allocation request; retrieve, using the ARCR engine, one or more predetermined requisitions corresponding to the resource allocation request from a requisition repository associated with the user; implement the one or more predetermined requisitions on the one or more preset values to generate one or more requisitioned values; and authorize the resource allocation request for the one or more requisitioned values.

SYSTEM FOR TRIGGERING ADAPTIVE RESOURCE CHANNEL REQUISITION WITHIN A DISTRIBUTED NETWORK

Systems, computer program products, and methods are described herein for triggering adaptive resource channel requisition within a distributed network. The present invention is configured to electronically receive, from a user input device, a resource allocation request from a user; retrieve, from the resource allocation request, information associated with the user; trigger an adaptive resource channel requisition (ARCR) engine on the request based on at least the information associated with the user; retrieve, from the resource allocation request one or more preset value associated with resource allocation request; retrieve, using the ARCR engine, one or more predetermined requisitions corresponding to the resource allocation request from a requisition repository associated with the user; implement the one or more predetermined requisitions on the one or more preset values to generate one or more requisitioned values; and authorize the resource allocation request for the one or more requisitioned values.

METHOD AND SYSTEM FOR A PROACTIVE ASSIGNMENT OF VIRTUAL NETWORK FUNCTIONS IN LOCAL DATA SYSTEMS
20230024892 · 2023-01-26 ·

A method for managing data includes obtaining, by a service function chain (SFC) orchestrator, a SFC request for a SFC, wherein the SFC comprises at least one virtual network function (VNF) and one service, in response to the SFC request: determining a set of candidate local data systems (LDSs) based on a resource availability mapping, performing a LDS analysis on the set of candidate LDSs, based on the LDS analysis: assigning the VNF to a candidate LDS of the set of candidate LDSs, assigning the service to a second LDS of the set of candidate LDSs, and based on the assigning of the VNF and the assigning of the service, initiating a deployment of the VNF and the service.

BLOCKED XOR FILTER FOR BLACKLIST FILTERING

A method of filtering a URL against a blacklist includes receiving at least a portion of a Uniform Resource Locator (URL), and determining which of a plurality of XOR filters is applicable to the received at least a portion of a URL, where each of the plurality of XOR filters represents a different portion of a URL blacklist. At least a portion of a URL is forwarded to the applicable one of the plurality of XOR filters, and the at least a portion of the URL is processed in the applicable one of the plurality of XOR filters to produce an output indicating whether the URL is likely on the blacklist.

Techniques for excess resource utilization
11563693 · 2023-01-24 · ·

Techniques to utilize excess resources in a cloud system, such as by enabling an auxiliary resource utilizer to use resources while they are not needed to support primary resource utilizers, are described herein. Some embodiments are directed to identifying and allocating excess capacity of resources in a cloud system to auxiliary resource utilizers based on one or more policies. In various embodiments, excess resources in one or more of the set of resources in the cloud system, or cloud resources, may be determined based on monitoring utilization of the cloud resources by the primary resource utilizers. In many embodiments, an auxiliary resource utilizer that is in compliance with a set of utilization policies may be identified and the excess resources may be allocated to the auxiliary resource utilizer.

Methods and apparatus for supporting dynamic network scaling based on learned patterns and sensed data

Methods and apparatus for predicting communications resources which will be needed at a venue and then controlling the amount of available resources dynamically are described. In various embodiments real time or near real time video of areas of the venue are used to predict the number of people in a portion of a venue and/or the direction of movement. Along with other information such as the type of event and/or event schedule collected information is supplied to a set of trained resource requirement models which are used to predict future resource needs at a venue, e.g., while an event is ongoing. Commands are sent to dynamically vary the amount of communications resources provided to one or more portions of the venue. Resources which can be varied included but are not limited to fixed wired WAN bandwidth, WiFi bandwidth, cellular bandwidth, network based on-demand services, transcoding services, firewall services, etc.

Application mapping and alerting based on data dependencies

Aspects of the disclosure relate to application mapping and alerting based on data dependencies in business and technology logic. In some embodiments, a computing platform may receive a request to map enterprise technology resources. Then, the computing platform may generate a business capability model. Next, the computing platform may cause a user computing device to display a graphical user interface comprising selectable graphical representations of applications associated with the enterprise technology resources. Then, the computing platform may receive a user input identifying an occurrence of a technology incident by selecting one of the graphical representations. In response to the selection, the computing platform may trace, using the generated business capability model, upstream or downstream impacts of the technology incident. Then, the computing platform may cause a visual representation of data dependencies indicating upstream or downstream impacts of the technology incident to be displayed on the user computing device.

Managing cloud acquisitions using distributed ledgers
11706155 · 2023-07-18 · ·

Systems and methods of the disclosure include: receiving, by a cloud resource provisioning component via a cloud provisioning request application programming interface (API), a cloud resource request; storing the cloud resource request on a cryptographically-protected distributed ledger; receiving, from a first cloud provider, a first cloud resource offer responsive to the cloud resource request; and responsive to receiving, from a node of the cryptographically-protected distributed ledger, a notification of validation of the first cloud resource offer with respect to the cloud resource request, causing the first cloud provider to provision a cloud resource specified by the first cloud resource offer.