H04L67/1001

ROUTING APPLICATION CONTROL AND DATA-PLANE TRAFFIC IN SUPPORT OF CLOUD-NATIVE APPLICATIONS

Techniques for using computer networking protocol extensions to route control-plane traffic and data-plane traffic associated with a common application are described herein. For instance, a traffic flow associated with an application may be established such that control-plane traffic is sent to a control-plane node associated with the application and data-plane traffic is sent to a data-plane node associated with the application. When a client device sends an authentication request to connect to the application, the control-plane node may send an indication of a hostname to be used by the client device to send data-plane traffic to the data-node. As such, when a packet including the hostname corresponding with the data-plane node is received, the packet may be forwarded to the data-plane node.

ROUTING APPLICATION CONTROL AND DATA-PLANE TRAFFIC IN SUPPORT OF CLOUD-NATIVE APPLICATIONS

Techniques for using computer networking protocol extensions to route control-plane traffic and data-plane traffic associated with a common application are described herein. For instance, a traffic flow associated with an application may be established such that control-plane traffic is sent to a control-plane node associated with the application and data-plane traffic is sent to a data-plane node associated with the application. When a client device sends an authentication request to connect to the application, the control-plane node may send an indication of a hostname to be used by the client device to send data-plane traffic to the data-node. As such, when a packet including the hostname corresponding with the data-plane node is received, the packet may be forwarded to the data-plane node.

Systems and methods for streaming media content during unavailability of content server

Systems and methods are described herein for streaming during unavailability of a content server. Upon determining that there are conditions indicating buffering issues during delivery of a media asset, a server determines a first group of devices suitable for receiving the media asset from the server and sharing the media asset on a peer-to-peer network. Then, the server determines a second group of devices suitable for receiving the media asset on a peer-to-peer network from a first group device. The server then determines groupings within which to share and receive the media asset. Next, the server transmits instructions to the devices in the first group to maintain in buffer and share certain portions of the media asset with the second group devices within their grouping. Finally, the server updates information detailing the media asset portions the devices are maintaining in buffer and sharing.

BROKERING SERVERS BASED ON REMOTE ACCESS PERFORMANCE
20230224354 · 2023-07-13 ·

Examples of a method for brokering remote servers are described herein. In some examples, performance data is received from a plurality of remote servers, where the performance data indicates rendering performance of a foreground application executed by at least one of the remote servers and streamed from at least one of the remote servers over a remote desktop connection. An indication of a selected application is received from a client. The client is directed to at least one of the remote servers based on the performance data and the selected application.

BROKERING SERVERS BASED ON REMOTE ACCESS PERFORMANCE
20230224354 · 2023-07-13 ·

Examples of a method for brokering remote servers are described herein. In some examples, performance data is received from a plurality of remote servers, where the performance data indicates rendering performance of a foreground application executed by at least one of the remote servers and streamed from at least one of the remote servers over a remote desktop connection. An indication of a selected application is received from a client. The client is directed to at least one of the remote servers based on the performance data and the selected application.

PROCESSING SYSTEM, AND PROCESSING METHOD

A processing system performs using an edge device and a server device, wherein the edge device includes processing circuitry configured to process processing target data and output a processing result of the processing target data, determine that the server device is to execute processing related to the processing target data when an evaluation value for evaluating which of the edge device and the server device is to process the processing target data satisfies a condition, determine that the evaluation value is included in a range for determining that processing is to be executed by the edge device when the processing result of the processing target data satisfies a predetermined evaluation, and output the processing result of the processing target data processed, and transmit data that causes the server device to execute the processing related to the processing target data when determining that the server device is to execute the processing.

PROCESSING SYSTEM, AND PROCESSING METHOD

A processing system performs using an edge device and a server device, wherein the edge device includes processing circuitry configured to process processing target data and output a processing result of the processing target data, determine that the server device is to execute processing related to the processing target data when an evaluation value for evaluating which of the edge device and the server device is to process the processing target data satisfies a condition, determine that the evaluation value is included in a range for determining that processing is to be executed by the edge device when the processing result of the processing target data satisfies a predetermined evaluation, and output the processing result of the processing target data processed, and transmit data that causes the server device to execute the processing related to the processing target data when determining that the server device is to execute the processing.

Data access policy management

A method for automated data access management can include creating a project that manages data access to data sources by a plurality of users, wherein each user has user attributes indicating data access policies for the data sources. The method can also include performing project equalization for the project, wherein the project equalization determines a set of user attributes shared by the users. Additionally, the method can include modifying the user attributes of each user for the project, wherein the user attributes of each user are modified to conform to the set of user attributes determined by the project equalization, and detecting a query to retrieve data from the data source. The method can include modifying the query to produce a modified query by applying the modified user attributes associated with the project to the query and retrieving the data from the data source based on the modified query.

Data access policy management

A method for automated data access management can include creating a project that manages data access to data sources by a plurality of users, wherein each user has user attributes indicating data access policies for the data sources. The method can also include performing project equalization for the project, wherein the project equalization determines a set of user attributes shared by the users. Additionally, the method can include modifying the user attributes of each user for the project, wherein the user attributes of each user are modified to conform to the set of user attributes determined by the project equalization, and detecting a query to retrieve data from the data source. The method can include modifying the query to produce a modified query by applying the modified user attributes associated with the project to the query and retrieving the data from the data source based on the modified query.

BINDING INDICATIONS FOR LOAD BALANCING AND REDUNDANCY FOR COMMUNICATIONS BETWEEN NETWORK FUNCTION INSTANCES IN A 5G CORE NETWORK
20230224756 · 2023-07-13 ·

In a Fifth Generation (5G) network having an enhanced SBA (eSBA) architecture, a message with a header used to signal binding information (e.g. HTTP custom header for 3gpp-Sbi-Binding) may be received at a recipient NF (service) instance in a direct communication or via a service communication proxy (SCP) in an indirect communication. A binding indication comprising an address of an NF (service) instance may be obtained from the header. One or more alternative binding indications comprising one or more alternative addresses of one or more alternative NF (service) instances may also be obtained from the header. The one or more alternative NF (service) instances may be equivalent NFs (services) of the same NF (Service) Set as the NF (service) instance. The address may be used for communication of messages to the NF (service) instance, and the one or more alternative addresses may be used for load balancing or backup failure.