Patent classifications
H04L47/82
Service chain accomodation apparatus and service chain accommodation method
A service chain accommodation device includes an influence coefficient calculation unit that calculates an influence coefficient indicating that an influence at the time of processing failure of a service chain is greater for a VNF located in a subsequent stage of a service chain and a VNF shared among a plurality of service chains, a residual resource calculation unit that corrects an amount of residual resources that can be accommodated for each of the VNFs through which the service chain passes, and an accommodation design unit that assigns a new service chain on the basis of the amount of the residual resources.
Technologies for assigning workloads to balance multiple resource allocation objectives
Technologies for allocating resources of managed nodes to workloads to balance multiple resource allocation objectives include an orchestrator server to receive resource allocation objective data indicative of multiple resource allocation objectives to be satisfied. The orchestrator server is additionally to determine an initial assignment of a set of workloads among the managed nodes and receive telemetry data from the managed nodes. The orchestrator server is further to determine, as a function of the telemetry data and the resource allocation objective data, an adjustment to the assignment of the workloads to increase an achievement of at least one of the resource allocation objectives without decreasing an achievement of another of the resource allocation objectives, and apply the adjustments to the assignments of the workloads among the managed nodes as the workloads are performed. Other embodiments are also described and claimed.
System and method for tag based request context in a cloud infrastructure environment
Systems and methods described herein support tag based request context in a cloud infrastructure environment. Cloud administrators do not generally have the ability to restrict resource usage in existing clouds. Granting a user permission to create resources allows them to create and/or terminate any number of resources up to a predefined account limit. Tags are associated with requests for resources for allowing administrators to restrict a user's handling of resources to the appropriate level by allowing fine-tuned control of access to the resources based on the context of the request for the resources. Request context information of the request is compared against a required credential gate level for permitting handling of resources in a tenancy having the first privilege level classification, and the request is selectively granted based on the request context information matching the first required credential gate level.
Dynamic Computing Resource Management
Various embodiments include network computing devices and methods for computing resource management. A processor of a network computing device may determine a latency metric and a transaction volume metric for a network application, determine an autoscaling cost based on the determined latency metric and transaction volume metric, allocate to the network application computing resources based on the determined autoscaling cost, and provide the allocated computing resources to the network application.
Target resource operation method, node device, terminal device and computer-readable storage medium
A target resource operation method, a node device, a terminal device and a computer-readable storage medium. The method includes: receiving a request to carry out an operation by using a first resource as a target resource; determining at least one resource associated with the first resource; and selecting a target resource from among the at least one resource associated with the first resource to carry out the operation. According to the described method and device, an associated resource may be selected as a target resource for carrying out an operation according to the relevance of each resource.
Reconfigurable computing pods using optical networks
Methods, systems, and apparatus, including an apparatus for generating clusters of building blocks of compute nodes using an optical network. In one aspect, a method includes receiving request data specifying requested compute nodes for a computing workload. The request data specifies a target n-dimensional arrangement of the compute nodes. A selection is made, from a superpod that includes a set of building blocks that each include an m-dimensional arrangement of compute nodes, a subset of the building blocks that, when combined, match the target n-dimensional arrangement specified by the request data. The set of building blocks are connected to an optical network that includes one or more optical circuit switches. A workload cluster of compute nodes that includes the subset of the building blocks is generated. The generating includes configuring, for each dimension of the workload cluster, respective routing data for the one or more optical circuit switches.
Internet of things resource subscription method, device, and system
An Internet of Things resource subscription method includes a parameter that is added to a subscription request message such that the device identifies, in a multiple-resource subscription scenario, parameters that need to be reported and parameters only used as subscription determining conditions. The Internet of Things resource subscription method can further enable a server to flexibly set, using a logical expression, a subscription condition in a subscription request.
DECENTRALIZED CLUSTER FEDERATION IN COMPUTER NETWORK NODE MANAGEMENT SYSTEMS
An arrangement includes a plurality of clusters and an interface through which a distributed federation database is accessible, wherein each of the clusters includes a cluster interface; a cluster local memory configured to store local cluster resources; and a federation controller. The federation controller is configured to: receive a first notification from the distributed federation database, wherein the first notification indicates a change relating to a federation resource in the distributed federation database; analyze the first notification; modify the local resource based on the analysis; and update a status of the federation resource in the distributed federation database when the local resource has been stored.
Technologies for switching network traffic in a data center
Technologies for switching network traffic include a network switch. The network switch includes one or more processors and communication circuitry coupled to the one or more processors. The communication circuitry is capable of switching network traffic of multiple link layer protocols. Additionally, the network switch includes one or more memory devices storing instructions that, when executed, cause the network switch to receive, with the communication circuitry through an optical connection, network traffic to be forwarded, and determine a link layer protocol of the received network traffic. The instructions additionally cause the network switch to forward the network traffic as a function of the determined link layer protocol. Other embodiments are also described and claimed.
One-time password for secure share mapping
Methods and systems for mapping a sharable resource using a one-time password are disclosed. An identifier included in a set of provided credentials uniquely associates the one-time password with an executable within a computing environment that hosts the sharable resource. When credentials are received in association with a mapping request, it is determined whether a supplied username corresponds to a user authorized to access the sharable resource and whether a representation of a supplied password received in association with the mapping request matches a representation of the one-time password. Validating the mapping request provides access to the sharable resource.