Patent classifications
H04L47/828
REDUCING A NETWORK DEVICE UPGRADE OUTAGE USING A REDUCED HARDWARE RESOURCE SCALING
In general, embodiments relate to a method, for managing a network device, that includes accessing, by a feature agent of the network device, an allocation data structure, wherein the allocation data structure specifies a first portion of memory and a second portion of memory, identifying, using the allocation data structure, the first portion of the memory to be used during an upgrade, wherein the second portion of memory is used for storing a network device table, wherein the network device table is used by a packet transmission component while the upgrade is being performed, and upon completion of the upgrade, updating the allocation data structure to specify that the packet transmission component use a second network device table and stop using the network device table, wherein the second network device table is initially populated during the upgrade.
SUB-SLICING WITHIN A NETWORK SLICE
The disclosed technology is directed towards facilitating the creation of network sub-slices within a network slice. When a network slice having defined default specification data (e.g., quality of service and prioritization levels) is instantiated, resources of the network slice can be allocated to network sub-slices within the network slice. A network sub-slice has modified specification data relative to the default specification data. Upon connection of a mobile device to the network, if the mobile device is part of a group associated with a network slice and sub-slice, the mobile device traffic is handled based on its network slice default specification data as modified by the modified sub-slice specification data. Network sub-slices thus provide a way for variations within the parameter data of a network slice, without the overhead and need to instantiate a separate network slice for each variation needed by subscribing entities.
AUTOMATED LOCAL SCALING OF COMPUTE INSTANCES
At a first compute instance run on a virtualization host, a local instance scaling manager is launched. The scaling manager determines, based on metrics collected at the host, that a triggering condition for redistributing one or more types of resources of the first compute instance has been met. The scaling manager causes virtualization management components to allocate a subset of the first compute instance's resources to a second compute instance at the host.
Intent-based network virtualization design
Example methods and systems for intent-based network virtualization design are disclosed. One example may comprise: obtaining configuration information and traffic information associated with multiple virtualized computing instances, processing the configuration information and traffic information to identify network connectivity intents and mapping the network connectivity intents to a logical network topology template. Based on a switching intent, a first group may be assigned to a logical network domain and the logical network topology template modified to include a logical switching element. Based on a routing intent, the logical network topology template may be modified to include a logical routing element. A logical network may be configured based on the modified logical network topology template to satisfy the switching intent and routing intent.
Resilient consistent hashing for a distributed cache
Resilient consistent hashing techniques are implemented to perform requests among nodes of a distributed system. Different load balancers are assigned different groups of request handling nodes that cache data to perform request. Requests are assigned to different load balancers according to a consistent hashing scheme. Load balancers distribute requests among assigned nodes using a load balancing scheme. Different numbers of nodes can be assigned to different load balancers.
Closed loop change management for cloud-based systems
Systems and techniques are disclosed for generating a session identifier to be used when implementing changes in a complex system that facilitates identification and retrieval of data indicating the scope and impact of the changes. An execution identifier for a set of operations and a service identifier for a service performing the operations may be used as a basis for the session identifier. The session identifier may be provided to computing resources on which operations are performed and logged by the computing resources along with the results of the operations. This activity data associated with the particular set of operations can be retrieved using the session identifier to determine the scope and impact of the operations on the system.
Generating infrastructure templates for facilitating the transmission of user data into a data intake and query system
Techniques are described for providing a cloud data collector (CDC) application for managing the generation of infrastructure templates. The CDC application provides graphical user interfaces that enable a user to provide inputs indicating configurations of data to be ingested by the data intake and query system, each configuration including one or more user accounts, in addition to data sources and regions associated with data sources. Using the configurations provided as input to the CDC application, the CDC application generates an infrastructure template that can be used to configure the service provider network to provide the requested security data to the data intake and query system.
5G EDGE CLOUD NETWORK DESIGN
Systems and methods may use a math programming model for designing an edge cloud network. The edge cloud network design may depend on various factors, including the number of edge cloud nodes, edge cloud node location, or traffic coverage, among other things.
Self-driven and adaptable multi-vBNG management orchestration
A broadband network gateway (BNG) controller is described that includes a network subscriber database (NSDB) and one or more core applications. The NSDB is configured to store vBNG instance information for one or more subscriber devices. The vBNG instance information specifies vBNG instances operable by one or more edge routers. The vBNG instances are configured to receive requests to access service provider services from the one or more subscriber devices and to selectively authenticate the one or more subscriber devices for network services based on authentication information included in the requests to access services provider services. The one or more core applications include a network instance and configuration manager (NICM). The NICM is configured to modify the vBNG instance information at the NSDB to include an additional vBNG instance and to output, to an edge router, an instruction to generate the additional vBNG instance at the edge router.
SYSTEM FOR SOURCE INDEPENDENT BUT SOURCE VALUE DEPENDENT TRANSFER MONITORING
Systems, computer program products, and methods are described herein for source independent but source value dependent transfer monitoring. The invention is configured to receive a processing request to initiate a processing network session, wherein the processing network session is associated with the processing of a first activity; receive, a processing interaction request to access a first resource associated with the user; extract a resource processing value associated with the first activity from the processing parameter data structure; determine whether the resource processing value is associated with triggering at least one block intervention step; block the entity input device from accessing the first resource in response to determining that the resource processing value is associated with triggering the at least one block intervention step during processing of the first activity; transmit a block notification to the entity input device; and trigger display of a success notification at an end-user application.