Patent classifications
H04L47/827
Multiplexed resource allocation architecture
A device configured to receive a data set and instructions for processing the data set from a network device. The device is further configured to parse the data set into a plurality of data segments to be processed, and generate a plurality of instruction segments from the received instructions. The device is further configured to assign each instruction segment to a resource unit, and to generate control information with instructions for combining processed data segments from the resource units. The device is further configured to receive processed data segments from the resource units, to generate the processed data set, and to output the processed data set to the network device.
Remote port for network connectivity for non-colocated customers of a cloud exchange
In general, techniques are described for network connectivity for non-colocated customers of a cloud exchange. A programmable network platform for the cloud exchange comprises processing circuitry configured to: configure a virtual network device in the data center to run a network service for a customer; receive, from the customer, a request for a remote port and network information for a network service provider connectivity service for the customer; assign, in response to receiving the request for the remote port, a remote port of the cloud exchange to the customer; and configure, in response to receiving the request for the remote port using the network information, the cloud exchange to connect the network service provider connectivity service to the virtual network device via the remote port of the cloud exchange.
METHOD, PRODUCT, AND SYSTEM FOR GENERATING DETECTION SIGNATURES BASED ON ATTACK PATHS IN A COMPUTER NETWORK IDENTIFIED USING A SOFTWARE REPRESENTATION THAT EMBODIES NETWORK CONFIGURATION AND POLICY DATA FOR SECURITY MANAGEMENT USING DETECTION SIGNATURE TEMPLATES
Disclosed is an approach for generating detection signatures based on analysis of a software representation of what is possible in a computer network based on network configuration data and network policy data. In some embodiments, the process includes maintaining a plurality of detection signature templates, generation of detection signatures (detection signature instances) using respective detection signature templates that are selected based on the analysis of the software representation. In some embodiments, detection signatures templates are of different type and may be deployed at different locations based on their respective type(s), such as at source, destination.
Aggregated Service Status Reporter
Systems as described herein may include generating an aggregated service status report for a real-time service delivery platform. A plurality of services running in a service domain may be determined. A request for a status of system behavior corresponding to a particular service may be received. Service connection details of the particular service may be discovered and metric data of real-time data movement may be tracked. Real-time snapshot aggregation of the particular service may be provided. In a variety of embodiments, a real-time system behavior report for the service across availability zones may be presented.
Cloud portal system for managing networking and computing equipment by generating contextual guides specific to affected resource(s)
Methods are provided in which a computing device obtains, from one or more disparate data sources, inventory data of a plurality of network resources in a plurality of domains of an enterprise network. The inventory data includes configuration information of the enterprise network. The method further includes the computing device selecting one or more contextual insights that apply to the inventory data of the enterprise network from contextual information related to one or more networks and configuration of the one or more networks and generating one or more contextual guides specific to one or more affected network resources of the enterprise network based on the one or more contextual insights.
Network node, a wireless device, a resource allocation server and methods for resource allocation
A resource allocation server including memory circuitry, processor circuitry, and an interface. The resource allocation server is configured to communicate with a plurality of resource allocation servers including a first resource allocation server of a first network. The resource allocation server is configured to receive, from a requester, a first resource allocation request indicative of a resource type. The resource allocation server is configured to negotiate, with the first resource allocation server, an allocation of a resource based on the resource type indicated in the first resource allocation request. The resource allocation server is part of a network different from the first network.
Service placement assistance
An example computing device is configured to receive, from a customer device, an indication of a plurality of resources and an indication of a plurality of customer services, each of the plurality of customer services being associated with a corresponding at least one requirement and a corresponding at least one constraint. The computing device is configured to automatically determine, for each requirement and each constraint, whether the requirement or the constraint can only be satisfied by a particular resource of the plurality of resources, and allocate, based on the determining, at least one resource of the plurality of resources to at least one customer service of the plurality of customer services. The example computing device is configured to provide, to the customer device and subsequent to the determining for every requirement and for every constraint, information to enable the customer device to provision the at least one customer service.
SYSTEMS AND METHODS FOR AUTOMATED REMOTE NETWORK PERFORMANCE MONITORING
In some implementations, a device may determine one or more parameters for filtering network traffic of a network that includes a plurality of virtual packet brokers provided for a plurality of cloud random access networks and a plurality of traffic aggregation points. The device may provide the one or more parameters to the plurality of virtual packet brokers, to cause the plurality of virtual packet brokers to filter the network traffic to obtain network visibility traffic. The device may receive, from one or more probes of a session aggregation point of the network, one or more metrics calculated based on the network visibility traffic by the plurality of virtual packet brokers. The device may determine one or more actions to be implemented based on the one or more metrics. The device may cause the one or more actions to be implemented in the network.
Resilient consistent hashing for a distributed cache
Resilient consistent hashing techniques are implemented to perform requests among nodes of a distributed system. Different load balancers are assigned different groups of request handling nodes that cache data to perform request. Requests are assigned to different load balancers according to a consistent hashing scheme. Load balancers distribute requests among assigned nodes using a load balancing scheme. Different numbers of nodes can be assigned to different load balancers.
On-demand access to compute resources
Disclosed are systems, methods and computer-readable media for controlling and managing the identification and provisioning of resources within an on-demand center as well as the transfer of workload to the provisioned resources. One aspect involves creating a virtual private cluster within the on-demand center for the particular workload from a local environment. A method of managing resources between a local compute environment and an on-demand environment includes detecting an event associated with a local compute environment and based on the detected event, identifying information about the local environment, establishing communication with an on-demand compute environment and transmitting the information about the local environment to the on-demand compute environment, provisioning resources within the on-demand compute environment to substantially duplicate the local environment and transferring workload from the local-environment to the on-demand compute environment. The event can be a threshold or a triggering event within or outside of the local environment.