H04L47/803

RECONFIGURABLE COMPUTING PODS USING OPTICAL NETWORKS
20230161638 · 2023-05-25 ·

Methods, systems, and apparatus, including an apparatus for generating clusters of building blocks of compute nodes using an optical network. In one aspect, a method includes receiving request data specifying requested compute nodes for a computing workload. The request data specifies a target n-dimensional arrangement of the compute nodes. A selection is made, from a superpod that includes a set of building blocks that each include an m-dimensional arrangement of compute nodes, a subset of the building blocks that, when combined, match the target n-dimensional arrangement specified by the request data. The set of building blocks are connected to an optical network that includes one or more optical circuit switches. A workload cluster of compute nodes that includes the subset of the building blocks is generated. The generating includes configuring, for each dimension of the workload cluster, respective routing data for the one or more optical circuit switches.

SMART CASCADING SECURITY FUNCTIONS FOR 6G OR OTHER NEXT GENERATION NETWORK
20230164529 · 2023-05-25 ·

In a 6G network, microservices can be utilized in the absence of a core network. For example, after a mobile device has authenticated, through its carrier network, with a transport service layer, microservices can be allocated to the mobile device without having to be transmitted via the core network. Thus, removing the core network from the process can generate a direct line of microservices from the transport layer to the end-user. Furthermore, additional microservices and/or resources can be access through a microservices library. Consequently, packets can be securely transmitted be a wireless network facilitating sending packet profile data from one to many node devices in anticipation of the packet traversing the various node devices.

DYNAMICALLY RE-ALLOCATING COMPUTING RESOURCES WHILE MAINTAINING NETWORK CONNECTION(S)

Techniques are described herein that are capable of dynamically re-allocating computing resources while maintaining network connection(s). Applications of users are run in a computing unit. Computing resources are allocated among the applications based at least in part on dynamic demands of the applications for the computing resources and resource limits associated with the respective customers. In a first example, the computing resources are dynamically re-allocated among the applications, as a result of changing the resource limit of at least one customer, while maintaining at least one network connection between a client device of each customer and at least one respective application. In a second example, the computing resources are dynamically re-allocated among the applications, as a result of changing the resource limit of at least one customer, while maintaining at least one network connection between an interface and a client device of each customer.

APPLICATION-SPECIFIC PACKET PROCESSING OFFLOAD SERVICE
20220321496 · 2022-10-06 · ·

A method for offloading network operations is described. The method includes receiving an offload service capabilities request message from a first application to request information from an offload service regarding capabilities of the offload service that meet a set of requirements; transmitting a response to the application that includes a set of offload service templates that are (1) selected based on the application requirements and (2) possible templates to be modified for performing operations of the application; evaluating the network resources for the program code of the application to select a set of network resources for offloading the operations of the first application to the network resources; and installing the program code, which was generated based on a set of offload service templates, on the set of network resources such that the set of network resources process packets from a second application that are addressed to the first application.

CLOUD SERVICE MESH PERFORMANCE TUNING

Examples described herein relate to a system to estimate latency of operations of a process without receiving a latency value directly based on received performance values and/or estimate throughput of packets transmitted for the process without receiving a throughput value directly based on received performance values. In some examples, the system is to request to adjust resource allocation to perform the process based on the determined latency and throughput.

USING MULTI-PHASE CONSTRAINT PROGRAMMING TO ASSIGN RESOURCE GUARANTEES OF CONSUMERS TO HOSTS

“Resource guarantee” refers to a unit of a resource that is guaranteed and therefore designated to a consumer. A multi-phased constraint programming (CP) approach is used to determine assignments of resource guarantees of a set of consumers to a set of hosts in a resource system. Phase I uses CP to segregate non-split consumers from split consumers. Phase II uses CP to assign each cotenant group of non-split consumers to a respective host. Phase III uses CP to assign resource guarantees of the split consumers across the hosts, wherein resource guarantees of a single split consumer may be splits across different hosts. Each phase involves execution of a CP solver based on a different CP data model. A CP data model declaratively expresses combinatorial properties of a problem in terms of constraints. CP is a form of declarative programming.

Dynamic allocation of network resources using external inputs

Systems and methods for managing network resources are disclosed. One method can comprise receiving first information relating to network traffic parameters and receiving second information relating to one or more contextual events having an effect on the network traffic parameters. The first information and the second information and be correlated. And one or more network resources can be allocated based on the correlation of the first information and the second information.

Smart bandwidth allocation

A controller is provided for use with a CD, a WAN, and a service provider server, the HNC includes: a memory; and a processor configured to execute instructions stored on memory to cause the HNC to: establish a priority time period; associate the priority time period with a first application; establish a first service flow queue having a first QoS during priority period; establish a second service flow queue having a second QoS; receive first upstream packets and second upstream packets; assign the first upstream packets to a first upstream queue during the priority time period; assign the second upstream packets to a second upstream queue; receive first downstream packets and second downstream packets; assign the first downstream packets to a first downstream queue during the priority time period; and assign the second downstream packets to a second downstream queue.

VEHICLE WIRELESS COMMUNICATION DEVICE AND COMMUNICATION CONTROL METHOD
20230209588 · 2023-06-29 ·

A wireless communication device uses multiple wireless communication services for communication between an in-vehicle device of a vehicle and an external device. The wireless communication device acquires a delay characteristic value for each wireless communication service from a network device. The delay characteristic value is an upper limit of an estimated range of delay time in communication. The wireless communication device acquires an allowable delay amount indicating a length of an allowable communication delay time from the in-vehicle device. The wireless communication device allocates a wireless communication service, which is relatively small in the delay characteristic value among the wireless communication services, to the in-vehicle device that is small in the allowable delay amount.

SYSTEMS FOR PROACTIVE MODIFICATION OF RESOURCE UTILIZATION AND DEMAND
20170373988 · 2017-12-28 ·

Computer systems and computer-implemented methods for determining a likelihood an application will exceed one or more of a resource utilization threshold or a resource demand threshold include receiving data for a plurality of applications, and based on the received data, determining one or more of a resource utilization or a resource demand for at least a subset of applications of the plurality of applications. A method additionally includes identifying a pattern from the received data, the pattern being associated with one or more of the resource utilization or the resource demand for the subset of applications, and based on the pattern, determining one or more of a resource utilization threshold or a resource demand threshold. A method can further include determining a likelihood the application will exceed one or more of the resource utilization threshold or the resource demand threshold.