Patent classifications
H04L47/746
Flow queueing method and system
A method includes receiving a packet. The method further includes determining whether the packet is part of a responsive connection. The method further includes determining whether a responsive buffer is full in response to a determination that the packet is part of the responsive connection. The method further includes applying a responsive probability to the packet in response to a determination that the responsive buffer is full. The method further includes determining whether to drop the packet based on the responsive probability. The method further includes accepting the packet for processing in response to a determination that the responsive buffer is not full or in response to a determination not to drop the packet.
System and method to estimate network disruption index
Presented herein are methodologies for implementing a system and apparatus to estimate a network disruption index and undertake a mitigation action accordingly. A method includes calculating a network disruption index based on at least a disruption score associated with a service request measure, an end-of-life measure, a security incident response measure and a return material authorization measure for respective hardware devices in a network, comparing the network disruption index to a predetermined threshold, and when the network disruption index is above the predetermined threshold, identifying one or more of the hardware devices in the network for a mitigation action and implementing the mitigation action.
EMS resolution of split-brain virtual network function components
An example operation may include a system, comprising one or more of receiving a virtual network function component instance (VNFCI) status notification resumption message with an active state when a peer VNFCI operational state is active, retrieving a timestamp of a VNFCI state change to an active state from an element VNFCI state database, retrieving a timestamp of a peer VNFCI state change to active from an element VNFCI state database, sending one or more of: a request to a virtual network function manager (VNFM) to determine if the VNFCI network is isolating while an operating state was active, and a request to the VNFM to determine if the peer VNFCI network is isolating while an operating state was active, sending a state change request with standby state to the peer VNFCI when the VNFCI is not network isolated and the peer VNFCI is network isolated, and a VNFM response is received regarding the VNFCI, a timeout response from the VNFM, and a VNFM response is received regarding the peer VNFCI, and sending a state change request with standby to the VNFCI with one or more of: the VNFCI network isolate and peer VNFCI is not network isolated, and the VNFCI is network isolated or the peer VNFCI is not network isolated, and the VNFCI is not network isolated and the peer VNFCI is network isolated and the VNFCI is in preferred standby.
Using distributed services to continue or fail requests based on determining allotted time and processing time
After a service receives a request from another service, the service determines an amount of time to process the request by the service as well as a remaining time allotment to complete processing the request (e.g., a timeout value). Based on the remaining time allotment and the amount of time to process the request by at least the service (predicted time or actual time), the service may determine whether to continue processing the request (e.g., by the service and/or one or more subsequent services) or fail the request. In response, the service may then continue processing the request (e.g., continue processing at the service itself or propagate the request to the next service), or the service may fail the request.
Systems and methods for managing streams of packets via intermediary devices
Virtual application and desktop delivery may be optimized by supplying application metadata and user intent to the device between a client and a server hosting resources for the delivery. The data packets used to deliver the virtual application or desktop may be also tagged with references to the application. By supplying the metadata and tagging packets with the metadata, an intermediary network device may provide streams of data packets at the target QoS. In addition, the device may apply network resource allocation rules (e.g., firewalls and QoS configuration) for redirected content retrieved by the client out of band relative to a virtual channel such as the Internet. The network resource allocation rules may differ for different types of resources accessed. The device may also control a delivery agent on the server to modify communication sessions established through the virtual channels based on network conditions.
EFFICIENT TROUBLE SHOOTING ON CONTAINER NETWORK BY CORRELATING KUBERNETES RESOURCES AND UNDERLYING RESOURCES
Some embodiments provide a method of tracking errors in a container cluster network overlaying a software defined network (SDN), sometimes referred to as a virtual network. The method sends a request to instantiate a container cluster network object to an SDN manager of the SDN. The method then receives an identifier of a network resource of the SDN for instantiating the container cluster network object. The method associates the identified network resource with the container cluster network object. The method then receives an error message regarding the network resource from the SDN manager. The method identifies the error message as applying to the container cluster network object. The error message, in some embodiments, indicates a failure to initialize the network resource. The container cluster network object may be a namespace, a pod of containers, or a service.
Link Protection Method In SDN, Switching Device, and Network Controller
A link protection method in a software-defined networking (SDN), a corresponding switching device and network controller, where the method includes receiving, by a first switching device in the SDN, first information from a network controller in the SDN and link protection information, where the first information establishes a communication link between the first switching device and a destination device, and the link protection information instructs the first switching device to proactively perform primary-to-secondary link switching when a link is faulty, establishing, by the first switching device, the communication link with the destination device according to the first information, and determining, by the first switching device according to the link protection information, that the first switching device proactively performs the primary-to-secondary link switching.
RESOURCE ALLOCATION AND TRANSFER UTILIZING HOLDS AND A DISTRIBUTED NETWORK
Embodiments of the present invention provide utilizing a distributed network of systems for allocating and transferring resources between entities (e.g., users, institutions, or the like) by providing holds (e.g., soft or hard) on the resources, allocating the resources, and transferring the resources by utilizing allocation identifiers and/or holding pools, if needed. The use of allocation identifiers and/or holds on the resources improves upon the processing speeds and power of systems used for the resource transfers between entities.
Secure handle for intra-and inter-processor communications
A protocol element referred to as a secure handle is described which provides an efficient and reliable method for application-to-application signaling in multi-process and multi-computer environments. The secure handle includes an absolute memory reference which allows the kernel to more quickly and efficiently associate a network data packet with an application's communication context in the kernel.
Fallback service through a cloud exchange for network service provider connections
An example method includes receiving, from a customer system by a cloud exchange comprising processing circuitry, a request to communicatively couple a virtual gateway on network infrastructure of the cloud exchange to a network gateway communicatively coupled to a public network, the request including data indicating a public Internet Protocol (IP) address of the customer system, wherein the customer system is configured with a first connection communicatively coupling the customer system and the public network via a network service provider (NSP) that is separate from the cloud exchange; configuring, by the cloud exchange, a network route for a network gateway to the virtual gateway, the network gateway communicatively coupled to the public network; and providing, by the cloud exchange to the network gateway, routing information including the public IP address of the customer system to create a second connection communicatively coupling the customer system and the public network.