H04L67/59

METHODS AND SYSTEMS FOR MANAGING APPLICATIONS OF A MULTI-ACCESS EDGE COMPUTING ENVIRONMENT

Examples herein involve a multi-access edge computing (MEC) environment. An example process may include receiving a tenant application that is to be hosted in a MEC environment. The MEC environment may be situated between a user device and an external platform. The process may include assigning an edge service identifier (ESID) to the tenant application. The ESID may be used to indicate that a message, associated with the user device, involves the tenant application. The process may include assigning a host identifier to the tenant application. The host identifier may be used to indicate that report data, associated with execution of the tenant application within the MEC environment, is to be provided to the external platform. The process may include routing communications associated with the tenant application using the ESID and the host identifier.

METHODS AND SYSTEMS FOR MANAGING APPLICATIONS OF A MULTI-ACCESS EDGE COMPUTING ENVIRONMENT

Examples herein involve a multi-access edge computing (MEC) environment. An example process may include receiving a tenant application that is to be hosted in a MEC environment. The MEC environment may be situated between a user device and an external platform. The process may include assigning an edge service identifier (ESID) to the tenant application. The ESID may be used to indicate that a message, associated with the user device, involves the tenant application. The process may include assigning a host identifier to the tenant application. The host identifier may be used to indicate that report data, associated with execution of the tenant application within the MEC environment, is to be provided to the external platform. The process may include routing communications associated with the tenant application using the ESID and the host identifier.

SYSTEMS AND METHODS FOR TRAVERSING A THREE DIMENSIONAL SPACE
20220171411 · 2022-06-02 ·

Disclosed herein are systems and methods for enabling at least one autonomous device to traverse a three-dimensional space. An example system may comprise a first autonomous vehicle comprising a first sensor suite. The first autonomous vehicle may traverse the three-dimensional space in accordance with a path planned vector. The path planned vector may be dynamically updated based on a first vector associated with a first object identified based on data received from the first sensor suite. The example system may comprise a first aerial vehicle comprising a second sensor suite. The first aerial vehicle may traverse the three-dimensional space based on at least one of data provided by the second sensor suite, the first sensor suite, and other aerial vehicles. The path planned vector may be dynamically updated based on data received from at least one of the first sensor suite, the second sensor suite, and cloud interface data.

Remote execution using a global identity

Embodiments of the present disclosure may provide a streamlined process for performing operations, such as data sharing and data replication, using multiple accounts. A global identity (also referred to as an organization user) may be employed, where the global identity may have access to multiple accounts across the same or different deployments. The global identity may switch between accounts from its login session and perform various tasks in the context of different accounts without undergoing further authentication.

Remote execution using a global identity

Embodiments of the present disclosure may provide a streamlined process for performing operations, such as data sharing and data replication, using multiple accounts. A global identity (also referred to as an organization user) may be employed, where the global identity may have access to multiple accounts across the same or different deployments. The global identity may switch between accounts from its login session and perform various tasks in the context of different accounts without undergoing further authentication.

Managing transmission control protocol (TCP) traffic

A terrestrial terminal enables communications, over a network connection, between a local host of one or more connected local hosts and a remote host. The terrestrial terminal is configured to perform operations comprising: receiving, from the remote host, a network packet for the local host; obtaining, from the network packet, an included TCP segment; determining, from the TCP segment, a receive window size advertised by the remote host; computing, using one or more characteristics of the network connection, a target receive window size; comparing the target receive window size with the advertised receive window size; and in response to determining that the target receive window size is different from the advertised receive window size: modifying the TCP segment by replacing the advertised receive window size with the target receive window size, and forwarding the network packet with the modified TCP segment to the local host.

Device subcomponent representations

A technology is described for a device shadowing service that manages device states. An example method may include receiving a state change message associated with a device that a subcomponent of the device has assumed a first state. In response to the state change message, a subcomponent representation associated with a device representation may be updated to indicate the first state received, where the device representation represents the device and the subcomponent representation represent the subcomponent of the device. Thereafter, a request may be received for the first state of the subcomponent of the device. The first state indicated by the subcomponent representation associated with the device representation may be determined, and the first state may be returned in response to the request.

Distributed network services
11736560 · 2023-08-22 · ·

Providing a distributed network service includes: receiving network traffic at a first physical device; and executing a service engine to participate in the distributed network service. The distributed network service is provided to at least the first target application instance executing in a first VM on the first physical device, and a second target application instance executing in a second VM on a second physical device; and a shared state of the distributed network service is maintained with respect to the first physical device and the second physical device.

Distributed network services
11736560 · 2023-08-22 · ·

Providing a distributed network service includes: receiving network traffic at a first physical device; and executing a service engine to participate in the distributed network service. The distributed network service is provided to at least the first target application instance executing in a first VM on the first physical device, and a second target application instance executing in a second VM on a second physical device; and a shared state of the distributed network service is maintained with respect to the first physical device and the second physical device.

Infrastructure support to enhance resource-constrained device capabilities
11334388 · 2022-05-17 · ·

An apparatus in one embodiment comprises at least one processing device that includes a processor coupled to a memory. The processing device is configured to receive in a requesting device a service availability notification relating to availability of one or more services implemented by a service providing device, to generate in the requesting device a request for a particular service based at least in part on the received service availability notification, and to send the request for the particular service from the requesting device to the service providing device. The requesting device illustratively comprises a resource-constrained device relative to the service providing device with respect to the particular service, and the particular service comprises a service that is capable of being performed in the requesting device but is offloaded from the requesting device to the service providing device via the request in order to conserve resources of the requesting device.