H04L47/80

END-TO-END QOS PROVISIONING FOR TRAFFIC OVER VPN GATEWAY

Some embodiments provide a method that assigns, at a VPN client, a QoS class to each path of multiple paths based on performance metrics for paths. The paths are available for use by a VPN client to reach a VPN server. The method identifies a QoS class for a packet. The method selects a path based on the identified QoS class of the packet and the QoS class assigned to each path. The method transmits the packet using the selected path.

System for request aggregation in cloud computing services

Cloud-based computing systems, although claimed to have virtually unlimited resources, could get oversubscribed due to budget constraints of cloud users. The disclosed invention proposes a mechanism to identify various types of “mergeable” tasks. The system also determines when it is appropriate to aggregate tasks and how to allocate them so that the QoS of other tasks is not affected. Experimental results under real-world workload settings show that the disclosed system can improve robustness of the system in the face of oversubscription and also saves the overall time of using cloud services by more than 14%.

Dynamic bandwidth service limits

A network services provider delivers bandwidth services to users in relation to a dynamic limit based on an average user consumption, rather than a fixed amount per subscriber. An average user consumption is employed to compute a consumption limit from relative portions of a user community substantially exceed the average, typically defined as “heavy users.” Usage levels below the consumption limit have an increased availability up to the consumption limit. The consumption limit may vary from a total capacity of the service infrastructure, which changes, generally in an increasing manner, as additional resources are added to the network. The consumption limits may be defined over different service intervals, such as daily, weekly or monthly, and for different groups of users depending on network layout.

Dynamic bandwidth service limits

A network services provider delivers bandwidth services to users in relation to a dynamic limit based on an average user consumption, rather than a fixed amount per subscriber. An average user consumption is employed to compute a consumption limit from relative portions of a user community substantially exceed the average, typically defined as “heavy users.” Usage levels below the consumption limit have an increased availability up to the consumption limit. The consumption limit may vary from a total capacity of the service infrastructure, which changes, generally in an increasing manner, as additional resources are added to the network. The consumption limits may be defined over different service intervals, such as daily, weekly or monthly, and for different groups of users depending on network layout.

Secure onboarding of computing devices using blockchain

Systems and methods are described for onboarding a new device to a blockchain secured network. A trusted device that is already enrolled on the blockchain can receive information from a new device. The new device can send an onboarding request to a server through a non-blockchain secured Application Programming Interface (“API”). The trusted device can send an onboarding request for the new device through a blockchain secured API. The server can receive the requests and match them. The server can authenticate the two devices and send a request to a blockchain consensus to add the new device to the blockchain with the trusted device as a referral. The blockchain consensus can add the new device to the blockchain and notify the server. The server can notify the new device, and the new device can begin communicating through the blockchain secured API or directly with other devices on the blockchain.

Techniques for dynamically allocating resources in a storage cluster system
11516148 · 2022-11-29 · ·

Various embodiments are directed to techniques for dynamically adjusting a maximum rate of throughput for accessing data stored within a volume of storage space of a storage cluster system based on the amount of that data that is stored within that volume. An apparatus includes an access component to monitor an amount of client data stored within a volume defined within a storage device coupled to a first node, and to perform a data access command received from a client device via a network to alter the client data stored within the volume; and a policy component to limit a rate of throughput at which at least the client data within the volume is exchanged as part of performance of the data access command to a maximum rate of throughput, and to calculate the maximum rate of throughput based on the stored amount.

Usage of pre-authorized QoS

In one aspect, a device, operating in an access network that can provide a plurality of QoS levels for user data flowing to and from the device, establishes a packet data session via the access network and receives, from the access network, cost information associated with each of one or more QoS levels. The device selects, for user data for at least a first application or service, a QoS level from among the plurality of QoS levels based on the cost information. The device transmits packets carrying user data for the first application or service to the access network. The transmission includes applying a QoS treatment to the user data according to the selected QoS level.

Cloud infrastructure planning assistant via multi-agent AI

Cloud infrastructure planning systems and methods can utilize artificial intelligence/machine learning agents for developing a plan of demand, plan of record, plan of execution, and plan of availability for developing cloud infrastructure plans that are more precise and accurate, and that learn from previous planning and deployments. Some agents include one or more of supervised, unsupervised, and reinforcement machine learning to develop accurate predictions and perform self-tuning alone or in conjunction with other agents.

Providing customized integration flow templates

A method and system are provided for customizing integration flow templates. The method can include can include monitoring user interaction with a plurality of systems external to an integration system to read data changes at the external systems and identifying at least one event pair, wherein each event pair is between two external systems having a same data change event in the two external systems. The identified event pairs are filtered for inclusion in an events chain and the external systems of the filtered event pairs are ordered in the events chain based on timestamps of the data change events. The method outputs integration flow templates based on the ordered external systems of the event pairs that define a flow trigger and at least one flow node.

BASE WIRELESS DEVICE AND WIRELESS COMMUNICATION METHOD
20220377023 · 2022-11-24 · ·

A base wireless device includes plural transmission buffers storing plural signals having transmission destinations that are different from each other, a transmission processing unit transmitting the signals to plural remote wireless devices respectively, by transmitting the signals stored in the plural transmission buffers in a predetermined order, regardless of whether or not each transmission has been made successfully, and a storage control unit, wherein when a transmission of a signal stored in one of the transmission buffers has been made successfully, the storage control unit overwrites the one transmission buffer from which the transmission has been made successfully, with another signal to be transmitted to a transmission destination that is different from a transmission destination of a signal stored in a transmission buffer other than the one transmission buffer from which the transmission has been made successfully, among the plural transmission buffers.