Patent classifications
H04L47/803
Adaptive Ambient Services
Adaptive ambient services are provided. In some embodiments, an adaptive ambient service includes providing an ambient service profile. In some embodiments, an ambient service includes implementing an ambient service profile for assisting control of the communications device use of an ambient service on a wireless network, in which the ambient service profile includes a plurality of service policy settings, and in which the ambient service profile is associated with an ambient service plan that provides for initial access to the ambient service with limited service capabilities prior to activation of a new service plan; monitoring use of the ambient service based on the ambient service profile; and adapting the ambient service profile based on the monitored use of the ambient service.
NETWORK RESOURCE SELECTION FOR FLOWS USING FLOW CLASSIFICATION
In some embodiments, a method receives a set of packets for a flow and determines a set of features for the flow from the set of packets. A classification of an elephant flow or a mice flow is selected based on the set of features. The classification is selected before assigning the flow to a network resource in a plurality of network resources. The method assigns the flow to a network resource in the plurality of network resources based on the classification for the flow and a set of classifications for flows currently assigned to the plurality of network resources. Then, the method sends the set of packets for the flow using the assigned network resource.
Systems and methods for automating resource deployment
A template generation system includes a computing device configured to, in response to receiving a request for a resource from a user device, identify a set of network identifiers based on the request and select a subset of identifiers of the set of network identifiers based on filtering criteria and the request. The computing device is further configured to, for each identifier of the subset of identifiers, in response to a record being associated with the corresponding identifier, clean the record and generate a new record defining the resource by mapping the requested resource to the corresponding identifier. The computing device is also configured to populate a template based on a set of rules identifying the subset of identifiers and the new record and transmit the template to a deployment system.
Controlling placement of workloads of an application within an application environment
A technique is directed toward controlling placement of workloads of an application within an application environment. The technique involves, while a first placement of workloads of the application is in a first deployment of resources within the application environment, generating a set of resource deployment changes that accommodates a predicted change in demand on the application. The technique further involves adjusting the first deployment of resources within the application environment to form a second deployment of resources within the application environment, the second deployment of resources being different from the first deployment of resources. The technique further involves providing a second placement of workloads of the application in the second deployment of resources to accommodate the predicted change in demand on the application, the second placement of workloads being different from the first placement of workloads.
GROUPING RESOURCE METADATA TAGS
A system for applying metadata tags based on metadata tag groups is described. The system includes a plurality of compute nodes configured to provide a plurality of computing resources for clients of a provider network and a resource tag manager for the provider network. The resource tag manager is configured to receive, from a first client of an account of the provider network, a creation request to establish a resource attribute group comprising a plurality of resource keys and a plurality of resource values, wherein respective metadata keys correspond to respective resource values. The resource tag manager may receive, from a second client of the account, an application request to apply the resource attribute group to a computing resource and apply the plurality of resource keys and the plurality of resource values to metadata maintained for the computing resource.
Allocating additional bandwidth to resources in a datacenter through deployment of dedicated gateways
Some embodiments provide policy-driven methods for deploying edge forwarding elements in a public or private SDDC for tenants or applications. For instance, the method of some embodiments allows administrators to create different traffic groups for different applications and/or tenants, deploys edge forwarding elements for the different traffic groups, and configures forwarding elements in the SDDC to direct data message flows of the applications and/or tenants through the edge forwarding elements deployed for them. The policy-driven method of some embodiments also dynamically deploys edge forwarding elements in the SDDC for applications and/or tenants after detecting the need for the edge forwarding elements based on monitored traffic flow conditions.
Control apparatus, control method and program
A control apparatus includes an acquisition unit that acquires application information related to at least one of a plurality of sessions at a plurality of timings for each of the plurality of sessions related to a plurality of types of applications that are communicating in a network, a search unit that searches for an allocation band of each of the plurality of sessions at the plurality of timings based on a QoE prediction value of each of the plurality of sessions derived from the application information and a condition for a band of the network, and a control unit that controls allocation of a band for each of the plurality of sessions at the plurality of timings based on the allocation band searched by the search unit.
MAPPING VLAN OF CONTAINER NETWORK TO LOGICAL NETWORK IN HYPERVISOR TO SUPPORT FLEXIBLE IPAM AND ROUTING CONTAINER TRAFFIC
Some embodiments of the invention provide a method for processing data messages for routable subnets of a logical network, the logical network implemented by a software-defined network (SDN) and connecting multiple machines. The method receives an inbound data message. The method performs a DNAT (destination network address translation) operation on the received data message to identify a record associated with a destination IP (Internet protocol) address of the data message. From the record, the method identifies a VLAN (virtual local area network) identifier, an LNI (logical network identifier), and a destination host computer IP address for the data message. The method encapsulates the data message with an outer header containing the destination host computer IP address and the VLAN identifier. The method forwards the encapsulated data message to the destination host computer.
System and method for managing video streaming congestion
A system and method for managing video streaming on a computer network based at least in part on a state of a video streaming traffic flow. The method includes: reviewing a traffic flow to determine whether the traffic flow is a video streaming traffic flow; if the traffic flow is a video streaming traffic flow, determine at least one video characteristic associated with the video streaming traffic flow; determining a state of the video streaming traffic flow; determining a priority of the video streaming traffic flow based on the characteristics and the state of the video streaming traffic flow; and allocating bandwidth to the video streaming traffic flow based on the priority; otherwise, if the traffic flow is not a video streaming traffic flow, allowing the traffic flow to continue with the traffic flow's current priority.
Resource-Sharing System with Cryptographically Enforced Fair Access
An article of manufacture includes instructions that, when loaded and executed by a processor, configure the processor to, at a coordinator electronic device, initiate a round of electronic device resource requests from a plurality of electronic devices, receive a request for an electronic device resource from each of the electronic devices, provide a fair access scheme for access to the electronic device resource for each of the electronic devices, and provide a proof to each of the electronic devices that the fair access scheme was used in providing access to the electronic device during the round.