Patent classifications
H04L47/746
GRACEFUL RESTART PROCEDURES FOR LABEL SWITCHED PATHS WITH LABEL STACKS
In general, techniques described are for providing graceful restart procedures for network devices of label switched paths (LSPs) implemented with label stacks. For example, a restarting network device may include a processor coupled to a memory that executes software configured to: receive a path signaling message including a recovery object that defines a reverse path of the LSP from an egress network device of the LSP to the restarting network device, including at least an upstream label and a downstream label associated with the restarting network device; determine, based on the recovery object, the upstream label and the downstream label associated with the restarting network device; and instantiate a control plane state of the restarting network device based on the recovery object.
SYSTEMS AND METHODS FOR MONITORING NETWORK DEVICES BASED ON PREDICTIVE ANALYSIS
A device may receive network data for network devices of an IMS network, and may determine that the network devices are active. The device may identify a set of network devices associated with the network data satisfying an upper threshold, and may determine that the network data of the set of network devices indicates healthy redundant network devices and satisfies a lower redundancy threshold. The device may determine that network data of the healthy redundant network devices satisfies an upper redundancy threshold, and may calculate a variance for the network data of the set of network devices. The device may analyze the network data of the set of network devices based on the variance satisfying a variance threshold, and may identify a first increase or a second increase in traffic for a particular network device. The device may perform actions based on identifying the first increase or the second increase.
True high availability of workloads in a cloud software-defined data center
In accordance with an embodiment of the invention, a cloud computing system is disclosed. The system includes a software-defined data center (SDDC), the SDDC including at least one cluster supported within the SDDC and at least one host computer running within the cluster, wherein the at least one host computer is configured to support at least one workload comprising an operating system and an application, and a cloud infrastructure, the cloud infrastructure including at least one child VM, the at least one child VM configured to virtualize the at least one host computer running within the cluster, and at least one parent virtual machine, wherein additional child VMs are deployed by forking the at least one parent VM.
Monitoring a communication system that is used for control and/or surveillance of an industrial process
A computer-implemented method for monitoring a communication system includes identifying a set of signals that need to be transmitted over the communication system for proper functioning of the control and/or surveillance; for each signal from the identified set of signals, identifying one or more resources of the communication system that are needed for transmission of this signal; obtaining information that is indicative of the operational state of the identified resources; and evaluating, from the obtained information, at least one remedial activity which, when performed on at least one resource, and/or on the control and/or surveillance, is likely to improve, and/or to restore, the reliability of the control and/or surveillance.
METHOD AND APPARATUS FOR TRANSMITTING AND RECEIVING BEAM FAILURE RECOVERY REQUEST FOR SECONDARY CELL
A communication method and system for converging a 5.sup.th generation (5G) communication system for supporting higher data rates beyond a 4.sup.th generation (4G) system with a technology for Internet of things (IoT) are provided. The communication method and system may be applied to intelligent services based on the 5G communication technology and the IoT-related technology. A method performed by a terminal for beam failure recovery (BFR) on a secondary cell (SCell) in a wireless communication system comprises receiving information for BFR on an SCell including a scheduling request configuration for the BFR on the SCell; detecting beam failure on the SCell based on whether a number of beam failure instances within a preconfigured time duration exceeds a preconfigured number; and, as a response to detecting the beam failure on the SCell, transmitting a scheduling request for the BFR on the SCell based on the scheduling request configuration.
Service Protection Method and Network Node
A service protection method includes a first node that determines that a fault has occurred on a first working path, and generates a service switching message based on the fault on the first working path. The first node sends the service switching message on a first protection path, where the service switching message indicates to adjust a bandwidth of a service from a guard bandwidth to a target bandwidth, where the guard bandwidth represents a pre-occupied bandwidth of the first protection path before the service is transmitted, where the target bandwidth represents an occupied bandwidth for transmitting the service on the first protection path, and where the guard bandwidth is less than the target bandwidth.
SID allocation
A segment identifier (SID) manager interfaces with clients by way of a library. Clients implementing network services and needing SIDs according to internet SRv6, are allocated blocks by the SID manager using the library. Clients assign SIDs from the block independent of the SID manager using the library. Where a threshold portion of the block is assigned, the library requests an additional block of SIDs from the SID manager. Clients transmit context mappings of assigned SIDs to the SID manager for use by administrators and to enable recovery in the event of failure.
Secure cluster pairing for business continuity and disaster recovery
Techniques are disclosed for providing backup protection. A first subnet is established for replication in a first cluster that includes a plurality of host devices. Each of the host devices includes a respective controller virtual machine, which together form a virtual local area network for replication. Each of the controller virtual machines is assigned an Ethernet interface. A replication Internet Protocol address is assigned to each of the Ethernet interfaces of the controller virtual machines. Route tables and firewall rules of the controller virtual machines are modified to allow communications between nodes of the first subnet. The first subnet is configured with information related to a second subnet for replication in a second cluster. A dedicated communication channel is generated for replication between the first cluster and the second cluster based on the configuring.
Efficient serving of resources during server unavailability
Systems and methods are provided for efficiently providing backup resources during server unavailability. Server unavailability includes server unresponsiveness and latency. The system and methods generate backup resources that can be provided to clients during server unavailability. The backup resources may be static versions of dynamically generated resources that rely on multiple services. The generation of backup resources can be prioritized based on a determination of the frequently accessed resources. During failure scenarios, the systems and methods can monitor and redirect traffic as needed to improve server recovery times.
WEB SITE REACHABILITY MANAGEMENT FOR CONTENT BROWSING
Embodiments of the invention provide for Web site reachability management in content browsing. A method of the invention includes monitoring different requests for different resources at respectively different resource location addresses initiating from different content browsers of different end users. Different responses to ones of the different requests that include an error code indicating an inability to provide a requested one of the different resources are detected and ones of the resource location addresses associated with corresponding ones of the different responses that include the error code are stored in a list. Finally, the each of resource location addresses are polled to determine whether or not a corresponding one of the resources is able to be retrieved. In response to determining that a resource of a resource location address in the list has become retrievable, the address is removed from the list and an associated end user notified.