Patent classifications
H04L47/822
AUTOMATED DECISION TECHNIQUES FOR CONTROLLING RESOURCE ACCESS
A durability assessment system may receive a request, from a computing system, for a durability index describing an entity. The durability assessment system may determine the durability index based on information about the resource usage by the entity, such as a resource availability score or a resource allocation score. The durability assessment system may compare the obtained resource availability score and resource allocation score to ranges associated with a set of durability indices. Based on the comparison, the durability assessment system may determine a durability index for the entity. The durability index may indicate an ability of the entity to return accessed resources. In some cases, the durability assessment system may provide the durability index to an allocation computing system that is configured to determine whether to grant access to resources based on the durability index.
TOKENIZED BANDWIDTH AND NETWORK AVAILABILITY IN A NETWORK
Embodiments described herein are directed to utilizing a tokenized system to manage network bandwidth. A total network bandwidth availability is determined for a network, and a total number of tokens is determined for that total network bandwidth. The system also determines a total number of users for the network. When a user sends a network usage request to use or access the network, the system selects and allocates a number of tokens for the user based on the network usage request, the total number of network users, and the total number of tokens. The user's device can then access and use the network if the user has a sufficient number of available tokens for that usage. The number of tokens for the user is reduced based on the amount of data used by the user.
RESOURCE ALLOCATION IN CLOUD COMPUTING SYSTEMS
Computing systems, devices, and associated methods of allocating computing resources in a distributed computing system to user requests are disclosed herein. In one example, a method includes when none of unallocated computing resources satisfy a constraint on a physical attribute in a received request for the computing resource, identifying one of the allocated resources in the distributed computing system that satisfies the constraint on the physical attribute and recursively determining whether one of the other allocated or unallocated resources in the distributed computing system that satisfies a constraint of a prior request. In response to determining that none of the allocated or unallocated resources satisfies the constraint of the prior request, assignment of the identified one of the allocated resources to the prior request is maintained.
RESOURCE ALLOCATING AND SCHEDULING FOR A NETWORK
A device configured to receive a resource reservation request that identifies a user and a resource. The device is further configured to generate a resource allocation that includes an association between the user, location information for the resource, a resource identifier for the resource, and a token value. The device is further configured to associate the resource allocation with a time interval indicating a deadline for using the resource allocation. The device is further configured to receive a reservation verification request from a network device. The device is further configured to determine the location information for the network device is within a predetermined distance from the location information for the resource, to determine the resource identifier matches the resource identifier for the resource, and to determine a current time is within the time interval. The device is further configured to generate resource allocation instructions authorizing access to the resource.
NETWORK-AWARE RESOURCE ALLOCATION
Systems and methods are provided for updating resource allocation in a distributed network. For example, the method may comprise allocating a plurality of resource containers in a distributed network in accordance with a first distributed resource configuration. Upon determining that a processing workload value exceeds a stabilization threshold of the distributed network, determining a resource efficiency value of the plurality of resource containers in the distributed network. When a resource efficiency value is greater than or equal to the threshold resource efficiency value, the method may generate a second distributed resource configuration that includes a resource upscaling process, or when the resource efficiency value is less than the threshold resource efficiency value, the method may generate the second distributed resource configuration that includes a resource outscaling process. The resource allocation may transmit the second to update the resource allocation.
Managing physical resources for virtual network functions
A method includes receiving profile information for a network. The method also includes determining a network configuration based on at least a constraint associated with at least one of a network session or a hardware capacity of a hardware platform of the network and a number of sessions that the network configured based on the network configuration can support. The method also includes configuring the network based on the network configuration.
System and method of associating metadata with computing resources across multiple providers
Systems, apparatuses, and methods for modifying metadata associated with database objects obtained from providers, such as cloud providers, are disclosed. Modifying metadata associated with database objects obtained from cloud providers may include identifying resources in a computer network that originate from providers, such as cloud providers that do not have associated metadata. A user interface that includes the resources may be generated, and the resource may receive input to select the resources and a descriptor that may be associated with the resources. The selected resources may then be associated, in a configuration management dataset, with metadata derived from the selected descriptor. The metadata may indicate an association of the selected resources to a parameter.
TECHNIQUES FOR EXCESS RESOURCE UTILIZATION
Techniques to utilize excess resources in a cloud system, such as by enabling an auxiliary resource utilizer to use resources while they are not needed to support primary resource utilizers, are described herein. Some embodiments are directed to identifying and allocating excess capacity of resources in a cloud system to auxiliary resource utilizers based on one or more policies. In various embodiments, excess resources in one or more of the set of resources in the cloud system, or cloud resources, may be determined based on monitoring utilization of the cloud resources by the primary resource utilizers. In many embodiments, an auxiliary resource utilizer that is in compliance with a set of utilization policies may be identified and the excess resources may be allocated to the auxiliary resource utilizer.
Crowd-sourced cloud computing resource validation
Resource provider specifications, characterizing computing resources of computing resource providers, are received. The reachability of each IP address included in the received specification is determined. An agent is deployed that is operable to determine the value of each of a set of metrics in the environment of the host at which the agent is deployed. The agent determines the value of each metric of the set of metrics in the environment of the relevant host, and communicates the determined values to one or more computing devices that validate whether the resources characterized by the communicated values are sufficient to provide the performance characterized by the received specification and that each ISP router complies with a predetermined policy. For each computing resource provider validated and determined to comprise an ISP router compliant with policy, the specified computing resources are added to a pool of resources for cloud computing.
Multi-tenant resource management in a gateway
Described herein are systems, methods, and software to manage resources in a gateway shared by multiple tenants. In one example, a system may monitor usage of resources by a tenant of the gateway and compare the usage with usage limits associated with the resources. The system may further determine when the usage of a resource exceeds a usage limit associated with the resource and, when the usage of the resource exceeds the usage limit, identify an operation associated with causing the usage limit to be exceeded and blocking the operation.