Patent classifications
H04L47/827
Selecting an optimal combination of cloud resources within budget constraints
Selecting an optimal combination of cloud resources within budget constraints, by a processor. All possible combinations for cloud resource bundles are computed which are available for allocation. The possible combinations are filtered according to predetermined criteria. The filtered possible combinations are divided into a first set that satisfies an overall workload demand for resources and a second set that partially satisfies the overall workload demand for resources. A level of goodness may be calculated for one or both of the first and second sets, and resources may be allocated from the first or second set to a cluster according to the calculated level of goodness. In some embodiments, the level of goodness may be defined based on the relative desirability (i.e., a user's preference) of aspects such as compute power, cost of resources, and the distribution or co-location of respective resources of the cloud resource bundles.
Method, device, and computer program product for edge resource aggregation
Embodiments of the present disclosure provide a method, a device, and a computer program product for edge resource aggregation. In one embodiment, a second edge device to which data associated with a first edge device will be transmitted is determined in an edge device cluster. Then, the data associated with the first edge device is transmitted to the second edge device. In this way, resources of multiple edge devices may be aggregated, thereby improving network efficiency and stability.
Regulation methods for proxy services
Systems and methods to manage and regulate the requests of multiple proxy clients are disclosed. In one aspect, the system and methods disclosed herein aids in configuring proxy server(s) with a rate-limit functionality. Configuration of the rate-limit functionality may be realized by, but not limited to, installing configuration file(s) and/or software application(s) on the proxy server(s). The configuration provides information about the list of restricted and unrestricted domains and their respective request limit specification in a given time frame. Therefore, each time before a proxy server forwards the clients' requests to a target domain, the proxy server checks and ensures that the request count to the particular target domain is well within the limit specified in the request limit specification. Thus, the embodiments described herein aid in preventing the IP addresses of proxy service providers from being blocked or denied from the target websites.
METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR NETWORK TESTING USING AN EMULATED DATA CENTER ENVIRONMENT
One method occurs at a test controller of a network test system implemented using at least one processor. The method includes receiving test configuration information for configuring a testing scenario comprising an emulated data center environment implemented using multiple network emulation platforms that are interconnected, wherein the test configuration information includes switching fabric topology information for defining the emulated data center environment; configuring, using the test configuration information, the emulated data center environment including sending a set of configuration instructions to each of the network emulation platforms, wherein each set of configuration instructions include resource allocation instructions for allocating ASIC switch resources of a respective network emulation platform to one or more emulated switches; and configuring, using the test configuration information, a test session for testing a system under test (SUT) using the emulated data center environment and a network visibility infrastructure.
SERVER-SIDE RESOURCE MONITORING IN A DISTRIBUTED DATA STORAGE ENVIRONMENT
Apparatus and method for performing real-time monitoring of server-side resources required to satisfy a client-side request in a distributed data storage environment, such as in a cloud computing or HPC (high performance computing) network. A client device is configured to issue a service request to carry out a service application associated with one or more server nodes. A request scheduler forwards the service request from the client device to a selected server node associated with the service request. A service log accumulates entries associated with data transfer operations carried out by the server node responsive to the service request over each of a succession of time periods. A service monitor accumulates, for each of the succession of time periods, information associated with the data transfer operations. A monitor tool aggregates the cumulative information to provide an indication of server-side resources utilized to satisfy the service request.
SYSTEM FOR MANAGING ADOPTION LIFECYCLE OF NETWORKING AND COMPUTING EQUIPMENT
Methods are provided in which a computing device obtains telemetry data associated with a network technology used in an enterprise network. The network technology is deployed using one or more assets of the enterprise. The methods further include the computing device determining, for each deployment of the network technology, a progression along an adoption lifecycle of the network technology, based on the telemetry data, generating, based on the progression of each deployment of the network technology, a first action set and an alternative second action set, different from the first action set, for further progression along the adoption lifecycle and providing the first action set and the alternative second action set for the further progression of the network technology along the adoption lifecycle.
PROVIDING RECOMMENDATIONS FOR IMPLEMENTING VIRTUAL NETWORKS
Some embodiments provide a novel method for deploying different virtual networks over several public cloud datacenters for different entities. For each entity, the method (1) identifies a set of public cloud datacenters of one or more public cloud providers to connect a set of machines of the entity, (2) deploys managed forwarding nodes (MFNs) for the entity in the identified set of public cloud datacenters, and then (3) configures the MFNs to implement a virtual network that connects the entity's set of machines across its identified set of public cloud datacenters. In some embodiments, the method identifies the set of public cloud datacenters for an entity by receiving input from the entity's network administrator. In some embodiments, this input specifies the public cloud providers to use and/or the public cloud regions in which the virtual network should be defined. Conjunctively, or alternatively, this input in some embodiments specifies actual public cloud datacenters to use.
Configuring edge nodes outside of public clouds to use routes defined through the public clouds
Some embodiments provide a novel method for deploying different virtual networks over several public cloud datacenters for different entities. For each entity, the method (1) identifies a set of public cloud datacenters of one or more public cloud providers to connect a set of machines of the entity, (2) deploys managed forwarding nodes (MFNs) for the entity in the identified set of public cloud datacenters, and then (3) configures the MFNs to implement a virtual network that connects the entity's set of machines across its identified set of public cloud datacenters. In some embodiments, the method identifies the set of public cloud datacenters for an entity by receiving input from the entity's network administrator. In some embodiments, this input specifies the public cloud providers to use and/or the public cloud regions in which the virtual network should be defined. Conjunctively, or alternatively, this input in some embodiments specifies actual public cloud datacenters to use.
Regulation methods for proxy services
Systems and methods to manage and regulate the requests of multiple proxy clients are disclosed. In one aspect, the system and methods disclosed herein aids in configuring proxy server(s) with a rate-limit functionality. Configuration of the rate-limit functionality may be realized by, but not limited to, installing configuration file(s) and/or software application(s) on the proxy server(s). The configuration provides information about the list of restricted and unrestricted domains and their respective request limit specification in a given time frame. Therefore, each time before a proxy server forwards the clients' requests to a target domain, the proxy server checks and ensures that the request count to the particular target domain is well within the limit specified in the request limit specification. Thus, the embodiments described herein aid in preventing the IP addresses of proxy service providers from being blocked or denied from the target websites.
Allocating defective computing resources for honeypot services
The disclosure relates to provisioning honeypot computing services using computing resources in a defective computing resource pool. In one example, a computing system can generate a maliciousness score for a received resource allocation request, determine that the generated maliciousness score exceeds a maliciousness threshold and identify a computing resource in a defective resource pool that is eligible to satisfy the request. The system can then provision honeypot computing services to fulfill the request, using the identified computing resource in the defective resource pool.