H04L47/765

Safe oversubscription of connection tracking entries

Techniques for safe oversubscription of connection tracking entries are described. A method for safe oversubscription of connection tracking entries may include receiving a request for an allocation of a resource on a physical host in a provider network, the request received by a resource allocation monitor from an instance hosted by the physical host, determining a resource availability on the physical host, the resource availability based on a total amount of the resource on the physical host, a reserved amount of the resource to a plurality of instances hosted by the physical host, and a shared amount of the resource, and granting or denying the resource allocation based at least on the determined resource availability.

Restrict services and policy control for always-on PDU session

A wireless device sends a PDU session establishment request message to an access and mobility management function (AMF). The PDU session establishment request message requests establishment of a packet data unit (PDU) session for an always-on PDU session. The wireless device receives a first message from the AMF. The first message indicates at least one service associated with the always-on PDU session. The wireless device sends at least one packet of an at least one allowed service of the at least one service via the always-on PDU session.

TECHNOLOGIES FOR SWITCHING NETWORK TRAFFIC IN A DATA CENTER

Technologies for switching network traffic include a network switch. The network switch includes one or more processors and communication circuitry coupled to the one or more processors. The communication circuity is capable of switching network traffic of multiple link layer protocols. Additionally, the network switch includes one or more memory devices storing instructions that, when executed, cause the network switch to receive, with the communication circuitry through an optical connection, network traffic to be forwarded, and determine a link layer protocol of the received network traffic. The instructions additionally cause the network switch to forward the network traffic as a function of the determined link layer protocol. Other embodiments are also described and claimed.

Dynamic visualization of requests traveling through a microservice mesh
11368408 · 2022-06-21 · ·

A method includes, in response to receiving a request for a graphical visualization of a microservice mesh comprising one or more nodes, obtaining information associated with services operating at the one or more nodes and connections between the one or more nodes. The method further includes determining, in view of the information, one or more types of requests associated with each of the services. The method further includes generating the graphical visualization of the microservice mesh. The graphical visualization includes a first vertex corresponding to a particular service and a second vertex corresponding to a type of a request received by the service. The first vertex and second vertex are connected by an edge that corresponds to the request.

Cloud translation mechanism

A system to facilitate communication between a cloud system and an edge server is described. The system includes one or more processors to execute a translation service to receive a first request operation from a cloud service, wherein the first request operation comprises a first communication protocol supported by the cloud service, translate the first request operation to a second communication protocol supported by a first edge server, wherein the second communication protocol is different from the first communication protocol and transmit the translated first request operation to the first edge server.

Cloud translation mechanism

A system to facilitate communication between a cloud system and an edge server is described. The system includes one or more processors to execute a translation service to receive a first request operation from a cloud service, wherein the first request operation comprises a first communication protocol supported by the cloud service, translate the first request operation to a second communication protocol supported by a first edge server, wherein the second communication protocol is different from the first communication protocol and transmit the translated first request operation to the first edge server.

Protecting integration between resources of different services using service-generated dependency tags

A resource tag service of a provider network may be used to protect integration between resources of different services by generating dependency tags. When a service receives, from a client, a request for a resource of the service to use another resource of another service, a dependency tag is generated by the resource tag service. The dependency tag indicates that the resource depends on the other resource (e.g., the resources are integrated). When the other service receives, from the client, a request to delete or modify the other resource, the deletion or modification of the other resource is prevented based on the existence of the dependency tag for the other resource (e.g., the dependency tag is attached to the other resource, indicating that the other resource of the other service is integrated with the resource of the service).

Protecting integration between resources of different services using service-generated dependency tags

A resource tag service of a provider network may be used to protect integration between resources of different services by generating dependency tags. When a service receives, from a client, a request for a resource of the service to use another resource of another service, a dependency tag is generated by the resource tag service. The dependency tag indicates that the resource depends on the other resource (e.g., the resources are integrated). When the other service receives, from the client, a request to delete or modify the other resource, the deletion or modification of the other resource is prevented based on the existence of the dependency tag for the other resource (e.g., the dependency tag is attached to the other resource, indicating that the other resource of the other service is integrated with the resource of the service).

Technologies for dynamically managing resources in disaggregated accelerators

Technologies for dynamically managing resources in disaggregated accelerators include an accelerator. The accelerator includes acceleration circuitry with multiple logic portions, each capable of executing a different workload. Additionally, the accelerator includes communication circuitry to receive a workload to be executed by a logic portion of the accelerator and a dynamic resource allocation logic unit to identify a resource utilization threshold associated with one or more shared resources of the accelerator to be used by a logic portion in the execution of the workload, limit, as a function of the resource utilization threshold, the utilization of the one or more shared resources by the logic portion as the logic portion executes the workload, and subsequently adjust the resource utilization threshold as the workload is executed. Other embodiments are also described and claimed.

Identifying edge clouds within networks

Techniques for edge cloud identification. An indication of edge clouds is received. Each edge cloud is uniquely identifiable via an associated edge cloud identifier. A characteristic is received from each of the edge clouds. An edge cloud for communication is determined based on the characteristic. The edge cloud is communicated with using its associated edge cloud identifier.