Patent classifications
H04L47/803
NETWORK-AWARE RESOURCE ALLOCATION
Systems and methods are provided for updating resource allocation in a distributed network. For example, the method may comprise allocating a plurality of resource containers in a distributed network in accordance with a first distributed resource configuration. Upon determining that a processing workload value exceeds a stabilization threshold of the distributed network, determining a resource efficiency value of the plurality of resource containers in the distributed network. When a resource efficiency value is greater than or equal to the threshold resource efficiency value, the method may generate a second distributed resource configuration that includes a resource upscaling process, or when the resource efficiency value is less than the threshold resource efficiency value, the method may generate the second distributed resource configuration that includes a resource outscaling process. The resource allocation may transmit the second to update the resource allocation.
APPLICATION BANDWIDTH THROTTLING
A method for processing network data, comprising receiving a data packet at a first processor having a non-transient data memory, storing the data packet in the non-transient data memory, accessing one or more first data fields of the data packet in the data memory, determining whether a device is bandwidth limited as a function of the first data fields being associated with an application, transmitting the data packet to a second processor over a network if it is determined that the device is not bandwidth limited, determining whether the device has reached a limit if it is determined that the device is bandwidth limited, transmitting the data packet to the second processor over the network if it is determined that the limit has not been reached and deleting the data packet without transmitting the data packet if it is determined that the limit has been reached.
Managing physical resources for virtual network functions
A method includes receiving profile information for a network. The method also includes determining a network configuration based on at least a constraint associated with at least one of a network session or a hardware capacity of a hardware platform of the network and a number of sessions that the network configured based on the network configuration can support. The method also includes configuring the network based on the network configuration.
Service Design Center for Device Assisted Services
A technique involves modular storage of network service plan components and provisioning of same. A subset of the capabilities of a service design system can be granted to a sandbox system to enable customization of service plan offerings or other controls.
Communications Device with Secure Data Path Processing Agents
Secure device data records (DDRs) are provided. In some embodiments, a system for secure DDRs includes a processor of a wireless communication device for wireless communication with a wireless network, in which the processor is configured with a secure execution environment, and in which the secure execution environment is configured to: monitor service usage of the wireless communication device with the wireless network; and generate a plurality of device data records of the monitored service usage of the wireless communication device with the wireless network, in which each device data record is associated with a unique sequence order identifier; and a memory coupled to the processor and configured to provide the processor with instructions. In some embodiments, the secure execution environment is located in an application processor, in a modem processor, and/or in a subscriber identity module (SIM).
COMMUNICATION DEVICE AND COMMUNICATION METHOD
A communication device (100) that operates as a management node in a first zone being a management domain on a network, the communication device (100) including: a communication unit (110) that executes communication with another node; and a control unit (130) that controls communication executed by the communication unit (110), in which the control unit (130) operates such that, when having received, from a user, a request regarding an application that chains one or more application functions (AFs) to act on a packet flowing in the network, the control unit (130) acquires information regarding the application from a second zone being a management domain other than the first zone, and then calculates a deployment destination of the AFs in the network including the first zone and the second zone based on the information.
Intelligent scheduling of Wi-Fi services for applications
Embodiments are directed to intelligent scheduling of Wi-Fi services for applications. An embodiment of computer-readable storage mediums includes instructions for receiving data packets from multiple connected devices at a wireless access point and identifying an application traffic flow for each data packet; assigning each data packet to a respective queue of a first set of queues based on an identified application traffic flow for each data packet; selecting data packets from the first set of queues based on priorities for each of multiple applications; generating prioritized candidate lists for selected data packets in a second set of queues, each queue being dedicated for an access category for one or more application; and scheduling data packets from the candidate lists, including selecting a transmission mode for each access category based on characteristics of the one or more applications.
On-demand resource provisioning
Methods, systems, and computer-readable media for on-demand resource provisioning for service instances. An on-demand service broker provisions IaaS resources at service instance creating time. The service broker provides a catalog listing one or more service plans, each service plan corresponds to a set of available resources. A user device selects a respective service plan that matches specific needs of an application that consumes the resources. The service broker generates a deployment manifest based on the selected service plan. The service broker then submits the deployment manifest to a deployment system. The deployment system provisions the resources to the service instance according to the manifest generated by the service broker.
Policy-based resource-exchange life-cycle in an automated resource-exchange system
The current document is directed to a resource-exchange system that facilitates resource exchange and sharing among computing facilities. The currently disclosed methods and systems employ efficient, distributed-search methods and subsystems within distributed computer systems that include large numbers of geographically distributed data centers to locate resource-provider computing facilities that match the resource needs of resource-consumer computing-facilities based on attribute values associated with the needed resources, the resource providers, and the resource consumers. The resource-exchange system organizes and tracks operations related to a resource exchange using a resource-exchange context. In one implementation, each resource-exchange context represents the stages of, and information related to, placement of one or more computational-resources-consuming entities on behalf of a resource consumer within a resource-provider computing facility and execution of the one or more computational-resources-consuming entities within the resource-provider computing facility.
Network-aware resource allocation
Systems and methods are provided for updating resource allocation in a distributed network. For example, the method may comprise allocating a plurality of resource containers in a distributed network in accordance with a first distributed resource configuration. Upon determining that a processing workload value exceeds a stabilization threshold of the distributed network, determining a resource efficiency value of the plurality of resource containers in the distributed network. When a resource efficiency value is greater than or equal to the threshold resource efficiency value, the method may generate a second distributed resource configuration that includes a resource upscaling process, or when the resource efficiency value is less than the threshold resource efficiency value, the method may generate the second distributed resource configuration that includes a resource outscaling process. The resource allocation may transmit the second to update the resource allocation.