H04L67/1029

Managing replication of computing nodes for provided computer networks

Techniques are described for providing managed computer networks, such as for managed virtual computer networks overlaid on one or more other underlying computer networks. In some situations, the techniques include facilitating replication of a primary computing node that is actively participating in a managed computer network, such as by maintaining one or more other computing nodes in the managed computer network as replicas, and using such replica computing nodes in various manners. For example, a particular managed virtual computer network may span multiple broadcast domains of an underlying computer network, and a particular primary computing node and a corresponding remote replica computing node of the managed virtual computer network may be implemented in distinct broadcast domains of the underlying computer network, with the replica computing node being used to transparently replace the primary computing node in the virtual computer network if the primary computing node becomes unavailable.

Managing replication of computing nodes for provided computer networks

Techniques are described for providing managed computer networks, such as for managed virtual computer networks overlaid on one or more other underlying computer networks. In some situations, the techniques include facilitating replication of a primary computing node that is actively participating in a managed computer network, such as by maintaining one or more other computing nodes in the managed computer network as replicas, and using such replica computing nodes in various manners. For example, a particular managed virtual computer network may span multiple broadcast domains of an underlying computer network, and a particular primary computing node and a corresponding remote replica computing node of the managed virtual computer network may be implemented in distinct broadcast domains of the underlying computer network, with the replica computing node being used to transparently replace the primary computing node in the virtual computer network if the primary computing node becomes unavailable.

Active mesh network system and method

According to one embodiment, a network system features a first virtual private cloud (VPC) network and a second VPC network. The first VPC network includes a first plurality of gateways. Each gateway of the first plurality of gateways is in communications with other gateways of the first plurality of gateways in accordance with a first tunnel protocol. Similarly, a second VPC network includes a second plurality of gateways. Each of the second plurality of gateways is communicatively coupled to the each of the first plurality of gateways in accordance with a second security protocol to provide redundant routing.

Active mesh network system and method

According to one embodiment, a network system features a first virtual private cloud (VPC) network and a second VPC network. The first VPC network includes a first plurality of gateways. Each gateway of the first plurality of gateways is in communications with other gateways of the first plurality of gateways in accordance with a first tunnel protocol. Similarly, a second VPC network includes a second plurality of gateways. Each of the second plurality of gateways is communicatively coupled to the each of the first plurality of gateways in accordance with a second security protocol to provide redundant routing.

Managing resource utilization in edge-computing systems

Resource utilization in edge-computing clusters and other computing clusters can be improved according to some aspects described herein. For example, an event handler can detect an event involving a state change to a data object. In response to detecting the event, the event handler can access an event registry storing relationships between a group of controllers and a group of events that are to be handled by the group of controllers. The event handler can determine, using the event registry, a controller that is configured to handle the event. The event handler can then transmit a command over a network to a computing cluster that includes a reconciler associated with the controller, where the command is for causing the reconciler to perform a reconciliation operation with respect to the data object. Separating the event-handling logic from the reconciliation logic in this way may improve resource utilization.

TECHNOLOGIES FOR SWITCHING NETWORK TRAFFIC IN A DATA CENTER

Technologies for switching network traffic include a network switch. The network switch includes one or more processors and communication circuitry coupled to the one or more processors. The communication circuity is capable of switching network traffic of multiple link layer protocols. Additionally, the network switch includes one or more memory devices storing instructions that, when executed, cause the network switch to receive, with the communication circuitry through an optical connection, network traffic to be forwarded, and determine a link layer protocol of the received network traffic. The instructions additionally cause the network switch to forward the network traffic as a function of the determined link layer protocol. Other embodiments are also described and claimed.

Methods, systems, and computer-readable media for distributing S1 connections to mobility management entities (MMEs) and N2 connections to access and mobility management functions (AMFs)
11576072 · 2023-02-07 · ·

A method for distributing connections to mobility management node instances includes publishing IP addresses for receiving connection requests and ingress messages from RAN nodes. The method further includes maintaining connection loading measurements of the mobility management node instances, receiving a connection request message generated by a RAN node for initiating a connection with one of the mobility management node instances, applying a connection distribution algorithm to select a mobility management node instance to handle the connection request message, and creating an association between an IP address of the selected mobility management node instance and an IP address and port of the RAN node extracted from a source IP address and source port field of the connection request. The method further includes forwarding the connection request message to the selected mobility management node instance.

DYNAMIC MANAGEMENT OF LOCATIONS OF MODULES OF A PLATFORM HOSTED BY A DISTRIBUTED SYSTEM
20230094964 · 2023-03-30 ·

In some implementations, a system may monitor session data associated with a first module and a second module of a platform. The system may determine a rate of communication between the first module and the second module based on the session data. The system may determine, using an optimization model, a co-location score associated with the first module and the second module based on the rate of communication, wherein the co-location score indicates an impact of co-location of the first module and the second module. The system may determine that the co-location score satisfies a co-location score threshold associated with an improvement to an operation of the platform. The system may perform an action associated with co-locating the first module and the second module.

DYNAMIC MANAGEMENT OF LOCATIONS OF MODULES OF A PLATFORM HOSTED BY A DISTRIBUTED SYSTEM
20230094964 · 2023-03-30 ·

In some implementations, a system may monitor session data associated with a first module and a second module of a platform. The system may determine a rate of communication between the first module and the second module based on the session data. The system may determine, using an optimization model, a co-location score associated with the first module and the second module based on the rate of communication, wherein the co-location score indicates an impact of co-location of the first module and the second module. The system may determine that the co-location score satisfies a co-location score threshold associated with an improvement to an operation of the platform. The system may perform an action associated with co-locating the first module and the second module.

Active-Active Standby For Real-Time Telephony Traffic
20220353325 · 2022-11-03 ·

Active-active standby is maintained for communication sessions using session initiation protocol (SIP) processes between two active session zones in a first datacenter and a standby session zone in a second datacenter. In the event of a failure at a first active session zone at the first datacenter, a failover to the second active session zone at the first datacenter is performed such that there are no interruptions in the active sessions. In the event of a failure at both active session zones at the first datacenter, a failover to the second datacenter is performed.