H04L47/786

Intent-based network virtualization design
11641320 · 2023-05-02 · ·

Example methods and systems for intent-based network virtualization design are disclosed. One example may comprise: obtaining configuration information and traffic information associated with multiple virtualized computing instances, processing the configuration information and traffic information to identify network connectivity intents and mapping the network connectivity intents to a logical network topology template. Based on a switching intent, a first group may be assigned to a logical network domain and the logical network topology template modified to include a logical switching element. Based on a routing intent, the logical network topology template may be modified to include a logical routing element. A logical network may be configured based on the modified logical network topology template to satisfy the switching intent and routing intent.

Lock reservations for shared storage

Techniques are provided for lock reservations for shared storage. A reserve command to reserve a storage structure is received by a driver from a node. The reserve command is formatted according to a storage protocol. The driver translates the reserve command into a lease acquire command formatted according to an object store protocol and targeting an object stored within an object store and corresponding to the storage structure. A lease identifier derived from a node identifier of the node is inserted into the lease acquire command. The lease acquire command is routed to the object store for obtaining a lease on the object for granting the node exclusive write access to the object.

Shared storage model for high availability within cloud environments

Techniques are provided for a high availability solution (e.g., a network attached storage (NAS) solution) with address preservation during switchover. A first virtual machine is deployed into a first domain and a second virtual machine is deployed into a second domain of a computing environment. The first and second virtual machines are configured as a node pair for providing clients with access to data stored within an aggregate comprising one or more storage structures within shared storage of the computing environment. A load balancer is utilized to manage logical interfaces used by clients to access the virtual machines. During switchover, the load balancer preserves an IP address used to mount and access a data share of the aggregate used by a client.

Method and Apparatus for Node Speed Limiting, Electronic Device and Storage Medium
20220263768 · 2022-08-18 ·

Embodiments of the present application relate to the technical field of computers, and provides a method and an apparatus for node speed limiting, an electronic device and a storage medium. The method comprises: receiving bandwidth data reported by a node under a target domain name, wherein the bandwidth data comprises the number of node connections and a node bandwidth, and the number of node connections is the number of connected devices in the node; and calculating a bandwidth quota for the node based on the bandwidth data and a quota upper limit for the target domain name.

INTENT-BASED NETWORK VIRTUALIZATION DESIGN
20220045932 · 2022-02-10 · ·

Example methods and systems for intent-based network virtualization design are disclosed. One example may comprise: obtaining configuration information and traffic information associated with multiple virtualized computing instances, processing the configuration information and traffic information to identify network connectivity intents and mapping the network connectivity intents to a logical network topology template. Based on a switching intent, a first group may be assigned to a logical network domain and the logical network topology template modified to include a logical switching element. Based on a routing intent, the logical network topology template may be modified to include a logical routing element. A logical network may be configured based on the modified logical network topology template to satisfy the switching intent and routing intent.

Load balancing for IP failover

Techniques are provided for load balancing for IP failover. A backend address of a first node is identified as a routing destination to which a request is to be routed by a load balancer based upon a load balancer rule mapping a frontend address, specified by the request as a request destination, to the backend address of the first node. The request is routed to a primary network interface of the first node using the backend address. The first node has a loopback interface with an address matching the frontend address for routing the request to a destination data structure based upon the request maintaining the frontend address as the request destination. Health probes are used by the load balancer for detecting a failure of the first node in order to failover to routing requests to a second backend address of a second node.

SYSTEMS AND METHODS FOR SERVICE RESOURCE ALLOCATION AND DEPLOYMENT
20210182117 · 2021-06-17 ·

A method, computer program product, and computer system for determining, by a computing device, a service instance count for each of a plurality of services to be executed on a plurality of host devices. A similarity between the plurality of services may be determined. A host instance count for the plurality of host devices may be determined based upon, at least in part, the similarity between the plurality of services. Each service instance may be allocated to a respective host device for execution based upon, at least in part, the similarity between the plurality of services, the service instance count, and the host service count.

Systems and methods for computing infrastructure resource allocation
11025561 · 2021-06-01 · ·

Embodiments include a resource allocation system for managing execution of a computing task by a hierarchically-arranged computing infrastructure. In embodiments, the resource allocation system can comprise a resource map, an index processor, and an allocation manager. The resource map can include data elements that are associated with each service provider, including parent-child relationships. Workloads can be assigned to providers based on one or more optimization indexes calculated for each service provider based on a plurality of level-specific performance metrics received from one or more monitoring engines.

Redirecting traffic from mobile device to initial slice selector for connection

Some embodiments provide a method for a first network slice selector that selects network slices for connections from endpoint devices located within a first geographic range. The method selects a network slice for a connection between a mobile endpoint device and a network domain that originates when the mobile endpoint device is located within the first geographic range. The method stores state that maps the connection to the selected network slice. The method forwards data traffic belonging to the connection from the mobile endpoint device onto the selected network slice using the stored state. After the mobile endpoint device moves from the first geographic range to a second geographic range, the method receives data traffic belonging to the connection from a second network slice selector that selects network slices for connections from endpoint devices within the second geographic range and forwards said received data traffic onto the selected network slice.

Method of and server for detecting associated web resources

A method of determining associated network resources from a plurality of network resources available on a network, the method executable by a server that is communicatively coupled to the network. The method comprises: scanning, by the server, the network to identify a first network resource and a second network resource of the plurality of network resources; retrieving, by the server, information associated with the first network resource and the second network resource, the information comprising at least one parameter of the first network resource and at least one parameter of the second network resource; in response to a match between the at least one parameter of the first network resource and at least one parameter of the second network resource, determining a connection between the first network resource and the second network resource.