H04L47/741

Store and forward logging in a content delivery network
11750536 · 2023-09-05 · ·

A computer-implemented method on a device. The device has hardware including storage. The method includes obtaining log event data from at least one component or service on the device that is to be delivered to a component or service on a distinct device. Each log event data item has a priority. If a connection to an external location is lost, at least some of the log event data items are selectively stored in the storage, wherein the storing is based on priority of the log event data items. Otherwise, if the connection is not lost, at least some of the log event data items are sent to the at least one external location.

CONTROLLER, CONTROL CIRCUIT, AND RESOURCE ALLOCATION METHOD

A controller includes a physical network information acquisition unit obtaining information about resource of a device and information about connection between devices in a wireless access network, a physical path calculation unit calculating physical path resource information based on the information about resource of the device and the information about connection between the devices, an abstract path resource calculation unit calculating abstract path resource information based on the physical path resource information, an abstract path correlation calculation unit generating correlation information between abstract paths, a resource pool storing the abstract path resource information and the correlation information, a temporary resource pool temporarily storing the abstract path resource information and the correlation information, an abstract resource allocation unit determining whether a slice meeting a requirement of a slice request can be generated, and a temporary resource calculation unit updating information in the temporary resource pool.

TOOL PORT THROTTLING AT A NETWORK VISIBILITY NODE

Systems and methods are disclosed for analyzing traffic received at a network visibility node to determine traffic levels relative to capacity at tools communicatively coupled to the network visibility node and throttling traffic when the traffic levels exceed tool capacity. In an illustrative embodiment, streams received at a network visibility node are analyzed to predict a traffic level) for a given traffic flow. The predicted level of traffic for a given traffic flow is used to decide whether to forward traffic associated with the given traffic flow to a tool port of the network visibility node that is communicatively coupled to an external tool.

Tool port throttling at a network visibility node

Systems and methods are disclosed for analyzing traffic received at a network visibility node to determine traffic levels relative to capacity at tools communicatively coupled to the network visibility node and throttling traffic when the traffic levels exceed tool capacity. In an illustrative embodiment, streams received at a network visibility node are analyzed to predict a traffic level for a given traffic flow. The predicted level of traffic for a given traffic flow is used to decide whether to forward traffic associated with the given traffic flow to a tool port of the network visibility node that is communicatively coupled to an external tool.

Methods, systems, and computer readable media for lockless communications network resource quota sharing
11290390 · 2022-03-29 · ·

An example method for lockless communications network resource quota sharing occurs at a first charging node of a distributed charging system comprising multiple charging nodes. The example method comprises: receiving, from a requesting entity, a first communications network resource quota request for requesting a first resource amount from the shared resources plan; without confirming that the shared resources plan has enough available resources to allot the first resource amount, providing, to the requesting entity, a first communications network resource quota for the first member, wherein the first communications network resource quota indicates a second resource amount less than the first resource amount and/or wherein the first communications network resource quota is associated with a validity time indicating when the first communications network resource quota expires; and sending, to a second charging node, a first resource reservation request for reserving resources of the shared resources plan.

Store and forward logging in a content delivery network
11134033 · 2021-09-28 · ·

A computer-implemented method on a device in a content delivery (CD) network. The device has hardware including storage with at least one first class of storage and at least one second class of storage, the first class of storage being faster than the second class of storage. A first portion of the first class of storage is allocated for log data, and a second portion of the second class of storage is allocated for log data. The method includes obtaining log event data from at least one component or service on the device that is to be delivered to a component or service on a distinct device. Each log event data item has a priority. If a connection to an external location is lost, at least some of the log event data items are selectively stored in the storage, wherein the storing is based on priority of the log event data items. Otherwise, if the connection is not lost, at least some of the log event data items are sent to the at least one external location.

Controller command scheduling in a memory system to increase command bus utilization

A first command is scheduled on a command bus, where the first command requires use of a data bus resource at a first time period after scheduling the first command. Prior to the first time period, a second command is identified according to a scheduling policy. A determination is made whether scheduling the second command on the command bus will cause a conflict in usage of the at least one data bus resource. In response to determining that scheduling the second command will cause the conflict in usage, a third lower-priority command is identified for which scheduling on the command bus will not cause the conflict in usage. The third command is scheduled on the command bus prior to scheduling the second command, even though it has lower priority than the second command.

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR LOCKLESS COMMUNICATIONS NETWORK RESOURCE QUOTA SHARING
20210152488 · 2021-05-20 ·

An example method for lockless communications network resource quota sharing occurs at a first charging node of a distributed charging system comprising multiple charging nodes. The example method comprises: receiving, from a requesting entity, a first communications network resource quota request for requesting a first resource amount from the shared resources plan; without confirming that the shared resources plan has enough available resources to allot the first resource amount, providing, to the requesting entity, a first communications network resource quota for the first member, wherein the first communications network resource quota indicates a second resource amount less than the first resource amount and/or wherein the first communications network resource quota is associated with a validity time indicating when the first communications network resource quota expires; and sending, to a second charging node, a first resource reservation request for reserving resources of the shared resources plan.

Synchronized release of resources used in deferential cloud services

A method is provided of using a set of servers to provide deferential services that have a pre-negotiated time for notice to release the servers. The method includes defining a virtual checkpoint frame interval that is constrained to a duration of up to half of the pre-negotiated time for notice to release the servers. The method includes, responsive to an end of the interval, (i) writing, to a shared state database, a state of processing of the packets and transactions occurring during the interval that are processed by a current one of the servers, and (ii) releasing the packets and transactions occurring during the interval. The method includes copying the packets and transactions occurring during the interval, and the state, from the current server to another server for subsequent processing, responsive to an indication of an instance loss on the current server.

OPPORTUNISTIC PACKET RETRANSMISSIONS
20210105213 · 2021-04-08 ·

In an opportunistic packet retransmission strategy, responsive to determining that a retransmission mode is set, a retransmission probability is calculated using minimum and maximum channel busy level retransmission thresholds, such that if a channel busy level of a communication channel is less than a minimum channel busy level retransmission threshold then a retransmission probability is set to 100%, if the channel busy level is greater than the maximum channel busy level then the retransmission probability is set to 0%, and within the minimum and maximum channel busy level retransmission thresholds the retransmission probability is set to decrease from 100% to 0% as a channel busy level of the communication channel rises from the minimum channel busy level retransmission threshold to the maximum channel busy level retransmission threshold. The message is retransmitted responsive to randomly determining whether to retransmit according to the retransmission probability.