Patent classifications
H04L47/782
Techniques for cloud control and management
Techniques for cloud control and management are provided. The control, creation, and management of workloads in distributed infrastructures are coordinated via a master Configuration Management Database (CMDB). The master CMDB is also used to unify the multiple distributed infrastructures so that the workloads are rationalized. Moreover, data centers are coordinated with the distributed infrastructures so the configuration settings and policies included in the master CMDB are enforced and synchronized throughout the network.
Interconnect resource allocation
The present disclosure advantageously provides a method and system for allocating shared resources for an interconnect. A request is received at a home node from a request node over an interconnect, where the request represents a beginning of a transaction with a resource in communication with the home node, and the request has a traffic class defined by a user-configurable mapping based on one or more transaction attributes. The traffic class of the request is determined. A resource capability for the traffic class is determined based on user configurable traffic class-based resource capability data. Whether a home node transaction table has an available entry for the request is determined based on the resource capability for the traffic class.
NETWORK DEVICES FOR SCALABLE POINT TO MULTIPOINT NETWORKS
The present disclosure includes systems and techniques relating to Point-to-Multipoint (P2MP) communication networks and G.hn networking standards used therewith. In some implementations, the system includes a domain master (DM) network device and one or more network devices. The DM network device is configured to receive control request messages from one or more network devices, establish a connection via a point-to-multipoint (P2MP) network coupling to the one or more network devices based on the received control request messages, and transmit control messages to one or more network devices via the connection. A network device is configured to receive the control messages from the DM network device, receive data from a backbone network coupled to the P2MP network coupling, and transmit the received data to a designated client device through the P2MP network coupling in accordance with a P2MP communication protocol using a resource allocation received in the control message.
VERIFICATION OF DATA PROCESSES IN A NETWORK OF COMPUTING RESOURCES
A method for managing data processes in a network of computing resources includes: receiving at least one child request being routed from an intermediary device to at least one corresponding destination device, the at least one child request requesting execution of at least one corresponding child data process, each of the at least one child data process for executing at least a portion of the at least one parent data process from an instructor device, and each of the at least one child request including a destination key derived at least in part from the at least one instructor key; storing the at least one child request in at least one storage device; modifying the at least one child request upon receiving a child request modification signal; and generating signals for communicating the child requests to one or more requesting devices.
HIERARCHICAL RESOURCE TREE ALLOCATION
A method for resource management includes receiving, from a client, an allocation request for a resource, and assigning, to the client, a partition of a hierarchical resource tree. The partition is in multiple partitions of the hierarchical resource tree. The method further includes identifying a deallocated resource in the partition, and allocating, to the client, the first deallocated resource from the partition to create an allocated resource.
System and method for service limit increase for a multi-tenant cloud infrastructure environment
Systems and methods described herein for automatic limit service increase in a multi-tenant cloud infrastructure environment. The systems and methods described herein provide for automatic approval of limit service increase requests that are either automatically generated based upon a tenant's usage of resources within the cloud infrastructure environment, or are received via, e.g., a user portal. Such automatic approval can be based upon a set of maximal limits that are computed based upon the tenant's current usage, level of subscription, or hard limit values.
SYSTEMS AND METHODS FOR DYNAMICALLY ALLOCATING RESOURCES BASED ON CONFIGURABLE RESOURCE PRIORITY
A system described herein may provide a technique for the dynamic selection of configurable resources in an environment that includes a hierarchical or otherwise differentiated arrangement of configurable resources. The environment may include, or may be implemented by, a Distributed Resource Network (“DRN”), which may include hardware or virtual resources that may be configured, including the instantiation of containers, virtual machines, Virtualized Network Functions (“VNFs”), or the like. The DRN may be hierarchical in that some resources of the DRN may provide services to, and/or may otherwise be accessible to, a greater quantity of elements of the DRN or some other network.
TECHNOLOGIES FOR SWITCHING NETWORK TRAFFIC IN A DATA CENTER
Technologies for switching network traffic include a network switch. The network switch includes one or more processors and communication circuitry coupled to the one or more processors. The communication circuity is capable of switching network traffic of multiple link layer protocols. Additionally, the network switch includes one or more memory devices storing instructions that, when executed, cause the network switch to receive, with the communication circuitry through an optical connection, network traffic to be forwarded, and determine a link layer protocol of the received network traffic. The instructions additionally cause the network switch to forward the network traffic as a function of the determined link layer protocol. Other embodiments are also described and claimed.
PROVIDING SECURE DATA REPLICATION AMONG NODES OF A HIERARCHICAL MULTITENANT SECURITY ORCHESTRATION AND AUTOMATED RESPONSE (SOAR) ARCHITECTURE
Systems and methods for facilitating secure and reliable communications among nodes of different tiers of a multi-tenant SOAR deployment are provided. According to one embodiment, data flow propagation within a hierarchy of nodes of the SOAR deployment is controlled. Responsive to creation of a record by a node: (i) when there exists a parent node in the hierarchy, setting a PID of the record to a TID of the parent node; otherwise, to a TID of the node; (ii) when there exists a child node in the hierarchy, setting a CID of the record to the TID of the child node; otherwise, to the TID of the node; and (iii) maintaining a set of propagation rules for the node relating to permissibility of propagation of the record within the hierarchy. During propagation of the record by the node, the PID and the CID of the record are updated.
METADATA EXTRACTION BASED ON RESOURCE ATTRIBUTES AND USER-DEFINED POLICY AND TOPOLOGY
Techniques are described herein that are capable of performing metadata extraction based on resource attributes and user-defined policy and topology. A hierarchical resource-grouping construct, which is selected from hierarchical resource-grouping constructs in a user-defined hierarchical resource-grouping topology of a cloud computing service account, is registered by enumerating at least a subset of the constructs. The subset includes the selected construct and each other construct encompassed by the selected construct. Metadata is selectively extracted from the constructs that are included in the subset to provide extracted metadata based at least in part on one or more user-defined policies, which are assigned among the constructs that are included in the subset, indicating whether the metadata is to be extracted as a result of resources associated with the constructs included in the subset having specified attributes. A searchable catalog is generated that includes the extracted metadata.