H04L47/781

SYSTEMS AND METHODS FOR QUEUE CONTROL BASED ON CLIENT-SPECIFIC PROTOCOLS
20230036796 · 2023-02-02 ·

The present disclosure generally relates to controlling access to resources by selectively processing requests stored in a task queue to prioritize certain requests over others, thereby preventing automated scripts from accessing the resources. More specifically, the present disclosure relates to a normalization and prioritization system for controlling access to resources by queuing resource requests based on a client-defined normalization process that uses one or more data sources.

RESOURCE POOL MANAGEMENT SYSTEM, RESOURCE POOL MANAGEMENT METHOD AND PROGRAM
20230034901 · 2023-02-02 ·

Provided are a resource pool management system, a resource pool management method, and a program which are capable of effectively utilizing hardware resources in which various functional units that achieve network services are deployed. An E2EO module identifies, when a specific type of functional unit is deployed on an unused hardware resource that is not included in any of a plurality of resource pools, the resource pool linked to the specific type of functional unit. A CMaaS module and a BMaaS module perform a system software setup in accordance with the specific type of functional unit on the unused hardware resource. The CMaaS module and the BMaaS module update resource pool management data to add the unused hardware resource on which the system software setup has been performed to the identified resource pool.

Systems and methods for implementing an on-demand computing network environment utilizing a bridge device

Systems and methods are provided for a computer-implemented method of implementing an on-demand computing network environment. A network specification is received from a user. Resources from one or more resource providers are provisioned. The on-demand computing network is configured, where configuring comprises assigning a first provisioned resource as a hub device and assigning one or more second provisioned resources as rim devices, where a particular rim device comprises a bridge device, where the bridge device repackages data received from the on-demand computing network prior to forwarding that data such that the data received from the on-demand computing network appears to terminate at the bridge device to an observer viewing the data between the hub device and the bridge device.

Method for controlling network congestion, access device, and computer readable storage medium

A method for controlling network congestion, including overlaying an overlay network packet header on an encapsulation outer layer of a transmit packet, where the overlay network packet header includes an outer Internet Protocol (IP) header, and an explicit congestion notification (ECN) identifier of an ECN is set in the outer IP header, decapsulating the overlay network packet header for an encapsulated reply packet, where an inner congestion identifier that is based on the ECN identifier is obtained from an IP header of the decapsulated reply packet through matching, and if the decapsulated reply packet is a User Datagram Protocol (UDP) packet, forwarding the UDP packet to a preset slow channel.

Reservation-Based Resource Configuration for Dynamic Workspaces

Reservations of resources within a dynamic workspace are made and facilitated including by pushing configurations specific to a worker for whom a reservation is made to the resource for a limited time period for the reservation. When the worker arrives for the reservation and checks in, configurations associated with the worker are obtained and pushed to the resource to configure the resource for use by the worker for a time period of the reservation. In some cases, an identity of the worker may be verified to complete the check in process for the reservation. In response to an end time of the reservation being determined, such as based on a scheduled end time for the reservation or based on a determination that the resource has gone unused for some amount of time, the configurations are removed from the resource to prepare the resource for use by a next worker.

NETWORK INTERFACE WITH RESOURCE COORDINATOR

An integrated circuit includes: a processor; a receiver coupled to the processor; and memory coupled to the processor. The memory stores resource coordinator instructions that, when executed by the processor, cause the processor to: maintain a plurality of active secure sessions; identify a priority session trigger; and allocate receiver resources for incoming packets related to the plurality of active secure sessions based on the priority session trigger.

Enhanced redeploying of computing resources

Examples described herein relate to method, resource management system, and non-transitory machine-readable medium for redeploying a computing resource. Data related to a performance parameter corresponding to a plurality of computing resources deployed on a plurality of host-computing nodes may be received. The performance parameter is associated with one or both of: communication between computing resources of the plurality of computing resources, or communication of the plurality of computing resources with a network device. Further, for a computing resource of the plurality of computing resources, a candidate host-computing node is determined from the plurality of host-computing nodes based on the data related to the performance parameter and the computing resource may be redeployed on the candidate host-computing node.

Home network resource management

Some implementations of the disclosure are directed to a method, comprising: receiving a plurality of traffic flows transmitted by a plurality of user devices; determining, at a modem, a user device of the user devices that is associated with each of the traffic flows; classifying, at the modem, each of the traffic flows according to a class of service associated with a traffic class; and allocating, at the modem, bandwidth to each of the traffic flows based on the traffic flow's class of service and the user device associated with the traffic flow. A total available bandwidth may be allocated to the traffic flows as a function of traffic classes associated with the traffic flows, the classes of services associated with the traffic flows, and the user devices that transmitted the traffic flows.

Hierarchical token buckets

Systems and methods are provided for efficient handling of user requests to access shared resources in a distributed system, which handling may include throttling access to resources on a per-resource basis. A distributed load-balancing system can be logically represented as a hierarchical token bucket cache, where a global cache contains token buckets corresponding to individual resources whose tokens can be dispensed to service hosts each maintaining a local cache with token buckets that limit the servicing of requests to access those resources. Local and global caches can be implemented with a variant of a lazy token bucket algorithm to enable limiting the amount of communication required to manage cache state. High granularity of resource management can thus enable increased throttle limits on user accounts without risking overutilization of individual resources.

DYNAMIC PATH SELECTION AND DATA FLOW FORWARDING

Various techniques for dynamic path selection and data flow forwarding are disclosed. For example, various systems, processes, and computer program products for dynamic path selection and data flow forwarding are disclosed for providing dynamic path selection and data flow forwarding that can facilitate preserving/enforcing symmetry in data flows as disclosed with respect to various embodiments.