H04L47/826

System for request aggregation in cloud computing services

Cloud-based computing systems, although claimed to have virtually unlimited resources, could get oversubscribed due to budget constraints of cloud users. The disclosed invention proposes a mechanism to identify various types of “mergeable” tasks. The system also determines when it is appropriate to aggregate tasks and how to allocate them so that the QoS of other tasks is not affected. Experimental results under real-world workload settings show that the disclosed system can improve robustness of the system in the face of oversubscription and also saves the overall time of using cloud services by more than 14%.

Spatial dispersion buffer
11522817 · 2022-12-06 · ·

An improved buffer for networking and other computing devices comprises multiple memory instances, each having a distinct set of entries. Transport data units (“TDUs”) are divided into storage data units (“SDUs”), and each SDU is stored within a separate entry of a separate memory instance in a logical bank. One or more grids of the memory instances are organized into overlapping logical banks. The logical banks are arranged into views. Different destinations or other entities are assigned different views of the buffer. A memory instance may be shared between logical banks in different views. When overlapping logical banks are accessed concurrently, data in a memory instance that they share may be recovered using a parity SDU in another memory instance. The shared buffering enables more efficient buffer usage in a network device with a traffic manager shared amongst egress bocks. Example read and write algorithms for such buffers are disclosed.

TRAFFIC-SHAPING HTTP PROXY FOR DENIAL-OF-SERVICE PROTECTION
20220385690 · 2022-12-01 · ·

In accordance with some aspects of the present disclosure, an apparatus is disclosed. In some embodiments, the apparatus includes a processor and a memory. In some embodiments, the memory includes programmed instructions that, when executed by the processor, cause the apparatus to receive a request from a client; determine family of metrics; schedule the request based on the family of metrics; and in response to satisfying one or more scheduling criteria, send the request to a backend server.

Blockchain-based dynamic storage provisioner
11516147 · 2022-11-29 · ·

Methods and systems for dynamically provisioning storage on a blockchain are provided. In one embodiment, a method is provided that includes receiving a request that includes a data unit for storage. The data unit may be buffered in a data stack that stores one or more data units. The data unit may be stored in the data stack until (i) a predetermined amount of time has passed and/or (ii) a size of the data stack exceeds a predetermined threshold. The data units stored in the data stack may then be encrypted and included in one or more storage transactions. The storage transactions may also include encryption keys used to encrypt the data units. The storage transactions may then be transmitted to nodes for storage on a blockchain.

COMMUNICATION DEVICE, COMMUNICATION SYSTEM, COMMUNICATION CONTROL METHOD AND PROGRAM
20220368559 · 2022-11-17 ·

A communication device includes a processing part and a communication part that communicates with one or more slaves. The processing part has a function of executing communication processing and setting processing. The communication processing is processing for transmitting a main frame including main data from the communication part to one or more slaves in a first period. The setting processing is processing for setting a second period shorter than the first period and a time slot allocated to at least one slave among the one or more slaves in every second period.

Cloud operation reservation system

In one or more embodiments, a cloud operation reservation system is provided through which cloud operations may be scheduled and managed. The cloud operation reservation system includes logic for defining a set of time windows that are available to perform one or more cloud operations on cloud targets and presenting the set of time windows to one or more tenants of a cloud service. Tenants may browse the presented set of time windows and submit reservation requests to update and/or perform other operations on cloud targets. In response to receiving, a request to reserve one or more slots in a particular time window, the cloud operation reservation system schedules one or more cloud operations to be performed on a cloud target that is available to at least one tenant.

NETWORK ALLOCATION VECTOR SETTING METHOD AND APPARATUS

A network allocation vector setting method including: detecting each channel of n channels to determine m occupied busy channels of the n channels and a time duration in which each busy channel is occupied; and setting network allocation vectors of at least m busy channels of the n channels according to l time durations.

RESOURCE OBTAINING METHOD, RESOURCE PROCESSING METHOD, AND COMMUNICATIONS DEVICE

A resource obtaining method includes: obtaining a target resource. The target resource includes at least one of a first resource or a second resource; the first resource corresponds to a first communications technology, the second resource corresponds to a second communications technology, and a resource interval between the first resource and the second resource is greater than or equal to a target time. The target time is determined according to a first time or a second time, the first time is a time required for switching between the first communications technology and the second communications technology, and the second time is a corresponding time obtained after a target interval is excluded from the first time.

Background Data Transfer Policy Formulation Method, Apparatus, and System
20230098362 · 2023-03-30 ·

Embodiments of this application disclose a background data transfer policy formulation method, an apparatus, and a system. The method includes: A first policy control network element sends, to a first network element, a first message used to request a background data transfer policy stored in the first network element, and obtains, from the first network element, the background data transfer policy stored in the first network element and second decision information that is used to formulate a second background data transfer policy. The first policy control network element formulates a first background data transfer policy based on first decision information used to formulate the first background data transfer policy and the second decision information and according to the background data transfer policy stored in the first network element.

REGULATION METHODS FOR PROXY SERVICES

Systems and methods to manage and regulate the requests of multiple proxy clients are disclosed. In one aspect, the system and methods disclosed herein aids in configuring proxy server(s) with a rate-limit functionality. Configuration of the rate-limit functionality may be realized by, but not limited to, installing configuration file(s) and/or software application(s) on the proxy server(s). The configuration provides information about the list of restricted and unrestricted domains and their respective request limit specification in a given time frame. Therefore, each time before a proxy server forwards the clients' requests to a target domain, the proxy server checks and ensures that the request count to the particular target domain is well within the limit specified in the request limit specification. Thus, the embodiments described herein aid in preventing the IP addresses of proxy service providers from being blocked or denied from the target websites.