H04L43/0811

RATE LIMIT AND BURST LIMIT ENHANCEMENTS FOR REQUEST PROCESSING
20230224231 · 2023-07-13 ·

A method that includes establishing an open connection for responding to requests from clients supported by an application server. The method may further include establishing a set of queues configured for storing requests received from the client via the open connection. The method may further include selecting requests from the queues based on a rate limit threshold and burst limit threshold of the application server. The rate limit threshold may refer to a number of requests that the application server can process within a first time duration, while the burst limit threshold may refer to a number of requests that the application server can process within a second time duration that is shorter than the first time duration. The method may further include transmitting the requests to a set of data processing servers connected to the application server and receiving an indication that the requests have been processed.

Logical network health check in software-defined networking (SDN) environments
11558255 · 2023-01-17 · ·

Example methods and systems for logical network health check. One example may comprise obtaining network configuration information and network realization information associated with a logical network; processing the network configuration information and the network realization information to determine the following: (a) network configuration health information specifying a network configuration issue and a first remediation action; and (b) network realization health information specifying a network realization issue and a second remediation action; and providing, to a user device, multiple user interfaces (UIs) specifying the first health information and the second health information along with a visualization of the logical network. In response to detecting an instruction initiated by the user device using at least one of the multiple UIs, the first remediation action or the second remediation action may be performed.

RECOVERING FROM DATA STALL EVENT IN A MULTI-NETWORK ENVIRONMENT
20230224206 · 2023-07-13 ·

Systems may comprise a connectivity manager application operating on a User Equipment (UE) for optimal and secure performance of local applications and improving user experience by optimizing application performance (e.g., detecting data stall events). The systems may monitor incoming internet protocol (IP) packets for one or more applications operating on the UE. The connectivity manager application may detect a drop in a rate at which the IP packets are received over a period of time and determine to reregister and/or reattach to a different node within a network or at a new network.

RECOVERING FROM DATA STALL EVENT IN A MULTI-NETWORK ENVIRONMENT
20230224206 · 2023-07-13 ·

Systems may comprise a connectivity manager application operating on a User Equipment (UE) for optimal and secure performance of local applications and improving user experience by optimizing application performance (e.g., detecting data stall events). The systems may monitor incoming internet protocol (IP) packets for one or more applications operating on the UE. The connectivity manager application may detect a drop in a rate at which the IP packets are received over a period of time and determine to reregister and/or reattach to a different node within a network or at a new network.

Analyzing user behavior patterns to detect compromised nodes in an enterprise network
11700269 · 2023-07-11 · ·

Systems and methods for analyzing user behavior patterns to detect compromised computing devices in an enterprise network are provided. According to one embodiment, an enforcement engine running on a network security device, identifies top users of a network exhibiting a suspicious behavior relating to login failures by determining a first set of users having a number of login failure events during a given time duration exceeding a threshold. The enforcement engine identifies from the first set of computers associated with the top users, a second set of computers exhibiting a suspicious behavior relating to new connections exceeding a threshold. The enforcement engine classifies a third set of computers, representing a subset of the second set exhibiting a suspicious behavior relating to consecutive new connections, as compromised source computers when their respective new connections are in a sequence that results in a Shannon entropy measure exceeding a threshold.

Aggregated service status reporter
11700314 · 2023-07-11 · ·

Systems as described herein may include generating an aggregated service status report for a real-time service delivery platform. A plurality of services running in a service domain may be determined. A request for a status of system behavior corresponding to a particular service may be received. Service connection details of the particular service may be discovered and metric data of real-time data movement may be tracked. Real-time snapshot aggregation of the particular service may be provided. In a variety of embodiments, a real-time system behavior report for the service across availability zones may be presented.

Aggregated service status reporter
11700314 · 2023-07-11 · ·

Systems as described herein may include generating an aggregated service status report for a real-time service delivery platform. A plurality of services running in a service domain may be determined. A request for a status of system behavior corresponding to a particular service may be received. Service connection details of the particular service may be discovered and metric data of real-time data movement may be tracked. Real-time snapshot aggregation of the particular service may be provided. In a variety of embodiments, a real-time system behavior report for the service across availability zones may be presented.

CONNECTIVITY ROBUSTNESS IN WIRELESS SYSTEMS

Systems and methods are contemplated for reconfiguration of one or more MAC instances while the WTRU is operating using dual- or multi-MAC instance connectivity. For example, upon reception of RRC reconfiguration information that modifies one or more secondary MAC instances, the WTRU may transmit a reconfiguration complete message to a Macro eNB (MeNB) and may synchronize to small-cell or secondary eNB (SeNB), for example if triggered by one or more of an RRC flag, a physical downlink control channel (PDCCH) order (MeNB/SeNB), MAC activation information, etc. For example, the WTRU may synchronize to the SeNB for specific type(s) of RRC reconfigurations, but not other type(s) of RRC reconfigurations. Although examples may be described in terms of dual connectivity, the WTRU may establish connectivity and perform mobility procedures with more than two radio access network (RAN) nodes (e.g., eNBs), and the embodiments described may be equally applicable to those scenarios.

CONNECTIVITY ROBUSTNESS IN WIRELESS SYSTEMS

Systems and methods are contemplated for reconfiguration of one or more MAC instances while the WTRU is operating using dual- or multi-MAC instance connectivity. For example, upon reception of RRC reconfiguration information that modifies one or more secondary MAC instances, the WTRU may transmit a reconfiguration complete message to a Macro eNB (MeNB) and may synchronize to small-cell or secondary eNB (SeNB), for example if triggered by one or more of an RRC flag, a physical downlink control channel (PDCCH) order (MeNB/SeNB), MAC activation information, etc. For example, the WTRU may synchronize to the SeNB for specific type(s) of RRC reconfigurations, but not other type(s) of RRC reconfigurations. Although examples may be described in terms of dual connectivity, the WTRU may establish connectivity and perform mobility procedures with more than two radio access network (RAN) nodes (e.g., eNBs), and the embodiments described may be equally applicable to those scenarios.

LIVENESS DETECTION AND ROUTE CONVERGENCE IN SOFTWARE-DEFINED NETWORKING DISTRIBUTED SYSTEM
20230216774 · 2023-07-06 ·

This disclosure describes techniques for improving speed of network convergence after node failure. In one example, a method includes storing, by SDN controller, an underlay routing table having routes for an underlay network of a data center and an overlay routing table having a set of routes for a virtual network of an overlay network for the data center, wherein the underlay network includes physical network switches, gateway routers, and a set of virtual routers executing on respective compute nodes of the data center; installing, within the underlay routing table, a route to a destination address assigned to a particular one of the virtual routers as an indicator of a reachability status to the particular virtual router in the underlay network. The SDN controller controls, based on presence or absence of the route within the underlay routing table, advertisement of the routes for the virtual network of the overlay network.