Patent classifications
H04L47/726
System and method thereof for multi-tiered mitigation of cyber-attacks
A method and system for controlling multi-tiered mitigation of cyber-attacks. The method comprises monitoring at least availability and load of each protection resource in a multi-tiered communication network, wherein each tier in the multi-tiered communication network includes a plurality of protection resources having capacity and security capabilities set according to the respective tier; for each protection resource, computing a current aggregated load metric (ALM); determining based on at least one of the computed ALM and security capabilities of a respective protection resource, if the respective protection resource assigned to a protected entity can efficiently handle a detected cyber-attack against the protected entity; and selecting at least one new protection resource to secure the protected entity, upon determining the protection resource cannot efficiently handle the detected cyber-attack, wherein the selection is based on at least one of the computed ALM and a security capabilities of the at least one protection resource.
METHODS AND APPARATUSES FOR COMMUNICATION
A method for communication. The method includes receiving or determining an input data stream; propagating the input data stream through a plurality of consecutive input processing stages; and transmitting a plurality of output data streams provided at the output section via a plurality of communication channels.
METHODS AND APPARATUSES FOR COMMUNICATION
A method for communication. The method includes receiving or determining an input data stream; propagating the input data stream through a plurality of consecutive input processing stages; and transmitting a plurality of output data streams provided at the output section via a plurality of communication channels.
METHOD, SYSTEM, STORAGE MEDIUM AND APPLICATION FOR JOINT OPTIMIZATION OF RESOURCE ALLOCATION
A method for joint optimization of resource allocation includes: obtaining network data volumes of two services; obtaining queue statuses at a time t; computing sub-channel slices; computing a local CPU speed scaling, a user association, a sub-carrier assignment, and a power allocation of service 1; computing a user association, a video quality decision, and a sub-carrier assignment of service 2; obtaining an initial sub-carrier assignment and an initial power allocation; obtaining the user association; obtaining the power allocation and the sub-carrier assignment of service 1; obtaining the video quality decision; obtaining the sub-carrier assignment of service 2; obtaining an optimal data transmission rate and the user association to obtain a data rate allocation; and obtaining an optimal CPU speed scaling, an optimal user association, an optimal sub-carrier assignment, an optimal power allocation, an optimal video quality decision and an optimal sub-channel allocation.
DYNAMIC DISCOVERY OF PEER NETWORK DEVICES ACROSS A WIDE AREA NETWORK
A network controller can register WAN edge routers and WAN optimizers distributed across a WAN. The controller can receive a request to establish a WAN optimized connection between first and second hosts. The controller can identify a first WAN optimizer to perform first services (e.g., de-duplication, compression, application acceleration, caching, etc.) for first traffic from the first host to the second host and first complementary services for second traffic from the second host to the first host, and a second WAN optimizer for the second traffic and second complementary services for the first traffic. The controller can establish the optimized connection comprising a first path including the first host, WAN optimizer, and router; a second path including the first router and a second router, and a third path including the second router, WAN optimizer, and host. The controller can route the first and second traffic through the optimized connection.
SYSTEMS AND METHODS FOR PROVIDING A GLOBAL VIRTUAL NETWORK (GVN)
Systems and methods for managing a global virtual network connection between an endpoint device and an access point server are disclosed. In one embodiment the network system may include an endpoint device, an access point server, and a control server. The endpoint device and the access point server may be connected with a first tunnel. The access point server and the control server may be connected with a second tunnel.
User Plane Path Selection Method and Apparatus
This application provides a user plane path selection method and an apparatus. The method includes: A first network element determines, based on at least one service type corresponding to a terminal device, service experience analytics data corresponding to the at least one service type, and then selects one or more user plane paths for a session of the terminal device based on the service experience analytics data. This enables a user plane path to be associated with a service, helps select a more appropriate user plane path for the terminal device, and can improve communication efficiency.
Systems and methods for multi-tier resource and subsystem orchestration and adaptation
Systems, methods, and machine-readable media to orchestrate process-performing resources and process protocols particularized to individual resources and loads are provided. Data changes in the data streams may be detected and identified. Data items from the data streams may be aggregated. Protocols that include parameter constraints according to specifications of process performance and/or operation performance may be identified. Operation-performing resources may be modeled with metrics being a function of protocols and consolidated data portions. A composite may be created that specifies a configuration a subsystem. The composite may be transmitted, and allocation of operation-performing resources to perform the defined process in accordance with the selected protocols may be controlled.
SOFTWARE LOAD BALANCER TO MAXIMIZE UTILIZATION
A load balancer receives a sequence of requests for computing service and distributes the requests for computing service to a computing node in an ordered list of computing nodes until the computing node reaches its maximum allowable compute capability. Responsive to an indication that the computing node has reached its maximum allowable compute capability, the load balancer distributes subsequent requests for computing service to another computing node in the ordered list. If the computing node is the last computing node in the ordered list, the load balancer distributes a subsequent request for computing service to a computing node other than one of the computing nodes in the ordered list of computing nodes. If the computing node is not the last computing node in the ordered list, the load balancer distributes a subsequent request for computing service to another computing node in the ordered list of computing nodes.
Centralized controller-based dynamic network bandwidth allocation and management
A device receives topology data and path data associated with a network that includes network devices. The device determines planned bandwidths for new paths through the network based on the topology data and the path data, and ranks the new paths, based on the planned bandwidths, to generate a ranked list. The device selects information identifying a first new path from the ranked list, wherein the first new path includes a first planned bandwidth. The device determines whether the first new path can be provided via a single route through the network based on the first planned bandwidth, and identifies two or more routes through the network for the first new path when the first new path cannot be provided via the single route. The device causes the first planned bandwidth to be reserved by two or more of the network devices for the two or more routes.