Patent classifications
H04L61/2514
Executing workloads across multiple cloud service providers
A multi-cloud service system establishes tunnels and network overlays across multiple CSPs while meeting a criterion for a latency threshold. The system conducts a latency benchmarking evaluation across each cloud region for multiple CSPs and based on the latency bench marking evaluation results, the system may identify a group of cloud regions that satisfy a criterion such as predetermined maximum latency threshold or geographical restriction. The system may provision the group of cloud regions by provisioning a tunnel between nodes of the multiple CSPs. The system further establishes an overlay network on top of the tunnel by encapsulating packets using encapsulation end point such as VTEP (VXLAN tunnel end point) over VXLAN (Virtual Extension Local Area Network), which may help to ensure reliable transmission of packets from pod to pod. The system may inject user data into each node to initiate operations across the provisioned nodes using injected user data.
Region-based connecting of calls using client-specific control and provisioned numbers
Systems and methods are disclosed for client-based control of revising caller identifications (IDs) for communications between a private network and a public network. An apparatus including a communications provider server and processing circuit that communicates client-specific sets of data over an interface protocol. The telecommunications-providing server revises a caller ID for a call based on the client-specific sets of data, an identifier that corresponds to a requesting endpoint, and a geographic region determined from the call request. Further, the telecommunications-providing server connects the VoIP call by accessing and passing a provisioned number. The provisioned number includes the revised caller ID which is a local number identified by the determined geographic region that the endpoint is located.
Region-based connecting of calls using client-specific control and provisioned numbers
Systems and methods are disclosed for client-based control of revising caller identifications (IDs) for communications between a private network and a public network. An apparatus including a communications provider server and processing circuit that communicates client-specific sets of data over an interface protocol. The telecommunications-providing server revises a caller ID for a call based on the client-specific sets of data, an identifier that corresponds to a requesting endpoint, and a geographic region determined from the call request. Further, the telecommunications-providing server connects the VoIP call by accessing and passing a provisioned number. The provisioned number includes the revised caller ID which is a local number identified by the determined geographic region that the endpoint is located.
Routing incoming calls made to one or more unreachable numbers into a data client
A method and a call routing system (CRS) are provided for routing an incoming call made to one of multiple numbers of a user to a call receiving client application (CRCA) deployed on one or more user devices when the called number is not reachable. The CRS, in communication with the CRCA deployed on one or more user devices, sets up a user account using one or more of the user's multiple numbers. The CRS detects availability of the CRCA on one or more user devices over a data network to accept an incoming call. The CRS receives the incoming call made to one of the numbers, when the called number is not reachable. The CRS routes the incoming call to the CRCA on one or more user devices over the data network on detecting the availability of the CRCA on one or more user devices over the data network.
Distributed network security using a logical multi-dimensional label-based policy model
A managed server (MS) within an administrative domain is quarantined. The administrative domain includes multiple MSs that use management instructions to configure management modules so that the configured management modules implement an administrative domain-wide management policy that comprises a set of one or more rules. The quarantined MS is isolated from other MSs. A description of the MS is modified to indicate that the MS is quarantined, thereby specifying a description of the quarantined MS. Cached actor-sets are updated to indicate the quarantined MS's changed state, thereby specifying updated actor-sets. A determination is made regarding which updated actor-sets are relevant to an other MS, thereby specifying currently-relevant updated actor-sets. A determination is made regarding whether the currently-relevant updated actor-sets differ from actor-sets previously sent to the other MS. Responsive to determining that the currently-relevant updated actor-sets are identical to the previously-sent actor-sets, no further action is taken.
Distributed network security using a logical multi-dimensional label-based policy model
A managed server (MS) within an administrative domain is quarantined. The administrative domain includes multiple MSs that use management instructions to configure management modules so that the configured management modules implement an administrative domain-wide management policy that comprises a set of one or more rules. The quarantined MS is isolated from other MSs. A description of the MS is modified to indicate that the MS is quarantined, thereby specifying a description of the quarantined MS. Cached actor-sets are updated to indicate the quarantined MS's changed state, thereby specifying updated actor-sets. A determination is made regarding which updated actor-sets are relevant to an other MS, thereby specifying currently-relevant updated actor-sets. A determination is made regarding whether the currently-relevant updated actor-sets differ from actor-sets previously sent to the other MS. Responsive to determining that the currently-relevant updated actor-sets are identical to the previously-sent actor-sets, no further action is taken.
Controlling network traffic pertaining to a domain name based on a DNS-IP mapping
Some examples relate to controlling network traffic pertaining to a domain name based on a Domain Name System-Internet Protocol address (DNS-IP) mapping, An example includes receiving, in a cloud computing system, a local DNS-IP mapping for a domain name from respective Access Points (APs) in a virtual local area network (VLAN) along with geographical information of respective APs; generating a global DNS-IP mapping database comprising the local DNS-IP mapping for the domain name received from respective APs in the VLAN along with geographical information of respective APs, in the cloud computing system; and determining appropriate APs to distribute the global DNS-IP mapping, based on location information of respective APs.
Controlling network traffic pertaining to a domain name based on a DNS-IP mapping
Some examples relate to controlling network traffic pertaining to a domain name based on a Domain Name System-Internet Protocol address (DNS-IP) mapping, An example includes receiving, in a cloud computing system, a local DNS-IP mapping for a domain name from respective Access Points (APs) in a virtual local area network (VLAN) along with geographical information of respective APs; generating a global DNS-IP mapping database comprising the local DNS-IP mapping for the domain name received from respective APs in the VLAN along with geographical information of respective APs, in the cloud computing system; and determining appropriate APs to distribute the global DNS-IP mapping, based on location information of respective APs.
Cloud-to-cloud interface
In general, this disclosure describes a cloud exchange (or “cloud exchange”) that offers a cloud-to-cloud interface (CCI) for interconnecting cloud services to tenants within public clouds. As described herein, the cloud exchange may be configured with a cloud-to-cloud interface that enables tenant applications of a public cloud to subscribe to and communicate with cloud services, using an end-to-end layer 3 path, in some cases without requiring a separate routing protocol session with a public edge device for the public cloud. In some examples, the public cloud provides a virtual layer 2 connection from a tenant within a public cloud to a routing instance of the cloud exchange, and the cloud exchange uses the routing instance to route service traffic between the tenant and the cloud services.
System and method for verifying and providing compensation for participation in real-time streaming of multimedia over a decentralized network
The present invention relates to systems and methods suitable for verifying and compensating nodes for streaming multimedia. In particular, the present invention relates to systems and methods that utilize a blockchain to verify and compensate devices for computational resources contributions when streaming multimedia over a decentralized network.