H04L47/803

ENHANCED REDEPLOYING OF COMPUTING RESOURCES
20210377184 · 2021-12-02 ·

Examples described herein relate to method, resource management system, and non-transitory machine-readable medium for redeploying a computing resource. Data related to a performance parameter corresponding to a plurality of computing resources deployed on a plurality of host-computing nodes may be received. The performance parameter is associated with one or both of: communication between computing resources of the plurality of computing resources, or communication of the plurality of computing resources with a network device. Further, for a computing resource of the plurality of computing resources, a candidate host-computing node is determined from the plurality of host-computing nodes based on the data related to the performance parameter and the computing resource may be redeployed on the candidate host-computing node.

Network congestion notification method, agent node, and computer device
11374870 · 2022-06-28 · ·

This disclosure relates to the field of data communication, and provides a network congestion notification method, an agent node, and a computer device. When receiving a first data packet, an agent node adds a source queue pair number to a first data packet to obtain a second data packet, and sends the second data packet to a receive end by using a network node. In a process of forwarding the second data packet, if the network node detects network congestion, the network node generates a first congestion notification packet carrying the source queue pair number, and sends the first congestion notification packet to the agent node. Further, the agent node sends the first congestion notification packet to a transmit end, so that the transmit end decreases a sending rate of a data flow to which the first data packet belongs.

Access control method, access control device, and data processing device

An access control unit includes packet buffers provided for each of users, a packet identification unit that stores received packets in a corresponding packet buffer, a scheduling unit that decides a packet buffer to be the object of transfer, a transfer control unit that, in a case that updating of reference data can be performed at an application processing circuit, and also the packet buffer decided by the scheduling unit is different from the current packet buffer that is the object of transfer, updates to reference data corresponding to the packet buffer decided by the scheduling unit, and a buffer selection unit that connects the packet buffers decided to be the object of transfer to the packet transfer unit when updating of reference data is completed.

Managing bandwidth based on user behavior

A method for managing bandwidth may include identifying a first tier of applications and a second tier of applications, determining a number of user sessions associated with at least one application among the first tier of applications and the second tier of applications, each user session consuming a percentage of bandwidth of at least one communication channel in a network, and baselining a second tier application bandwidth use for each user session associated with the second tier of applications to determine a first interval and a second interval. The method may also include calculating a second tier application usage score associated with the second tier of applications, the calculating including determining a percentage of bandwidth used by the second tier of applications in the first interval and determining a percentage of bandwidth used by the second tier of applications in the second interval, generating a user score based on the second tier application usage score and a percentage of use of the first tier of applications, and adjusting a bandwidth allocation based on the user score.

Dynamic visualization of requests traveling through a microservice mesh
11368408 · 2022-06-21 · ·

A method includes, in response to receiving a request for a graphical visualization of a microservice mesh comprising one or more nodes, obtaining information associated with services operating at the one or more nodes and connections between the one or more nodes. The method further includes determining, in view of the information, one or more types of requests associated with each of the services. The method further includes generating the graphical visualization of the microservice mesh. The graphical visualization includes a first vertex corresponding to a particular service and a second vertex corresponding to a type of a request received by the service. The first vertex and second vertex are connected by an edge that corresponds to the request.

Systems and Methods for Applying SD-WAN Policies to Router-Generated Traffic

In one embodiment, a method includes receiving non-Internet Protocol (IP) traffic from one or more non-IP traffic sources. The method also includes terminating the non-IP traffic and re-originating the non-IP traffic as first IP traffic in accordance with one or more software-defined networking in a wide area network (SD-WAN) protocols. The method further includes communicating the first IP traffic to an SD-WAN link in accordance with one or more SD-WAN policies.

SYSTEMS AND METHODS FOR PERFORMING SELF-CONTAINED POSTURE ASSESSMENT FROM WITHIN A PROTECTED PORTABLE-CODE WORKSPACE

Systems and methods for performing self-contained posture assessment from within a protected portable-code workspace are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory having program instructions that, upon execution, cause the IHS to: transmit, from an orchestration service to a local agent, a workspace definition that references an application, where the application comprises a first portion of code provided by a developer and a second portion of code provided by the orchestration service; and receive, from a local agent at the orchestration service, a message in response to the execution of the second portion of code within a workspace instantiated based upon the workspace definition. The second portion of code may inspect the contents of the runtime memory of the workspace upon execution, for example, by performing a stack canary check, a hash analysis, a boundary check, and/or a memory scan.

Method for managing allocation requests to allocate a computing resource
11362963 · 2022-06-14 · ·

A method for managing an allocation request to allocate a computing resource in a cloud computing system having comprising at least two data centers connected to one another via a communication network, implemented by an access device allowing a terminal to access the communication network and which determine a routing path to a service address. The method includes: transmitting the request to a first data center; and if the computing resource is not available, retransmitting the request to an adjacent data center that is the following one in the routing path, the retransmission of the request being reiterated until either a data center responds that the resource is available or the request has been retransmitted to all of the data centers.

NORTHBOUND INTENT-BASED DYNAMIC APPLICATION INTERFACE

Northbound intent-based application insertion may be employed within a mobile communications network established with a software defined network (SDN) including both an applications plane and also a control plane in which different infrastructure resources are accessible through a northbound API. A request from a mobile application first is received in the control plane for the application to be inserted into the application layer utilizing different infrastructure resources of the control plane. The mobile application is then characterized and a set of recommended resources for the characterization retrieved. Finally, those of the resources to be utilized by the mobile application are compared to the set of recommended resources in order to identify a variance of resources and the resources to be utilized by the mobile application, as adjusted by the variance of resources, are then provisioned for use by the mobile application.

METHOD AND APPARATUS FOR RETURNING EXECUTION RESULT OF FUNCTION IN NAME-BASED IN-NETWORK DISTRIBUTED COMPUTING SYSTEM
20220182334 · 2022-06-09 ·

The present invention relates to an apparatus and method for returning execution result of function in name-based in network distributed computing system. The present invention includes sending a first packet requesting execution of a function to a first node; transmitting a second packet requesting the execution result of the function to a second node; and receiving, after transmitting the second packet, a third packet, which comprises the execution result of the function, from the second node.