H04L67/101

Systems and methods for cloud-based hybrid service meshes in microservice architectures

Systems and methods for cloud-based hybrid service meshes in microservice architectures are disclosed. A method for selection of a microservice in a cloud-based hybrid mesh microservice architecture may include: (1) receiving, at a hybrid service mesh library in a first microservice instance, a request for a second microservice, wherein the hybrid service mesh library comprises microservice information for a plurality of microservice instances comprising an identification of each microservice instance, a location for each microservice instance, and a status for each microservice instance; (2) identifying, by the hybrid service mesh library, a number of microservice instances for the microservice and the location of each microservice instance; (3) selecting, by the hybrid service mesh library, one of the plurality of microservice instances; and (4) calling, by the hybrid service mesh library, the selected microservice instance.

Systems and methods for dynamic and efficient device monitoring via a network
11509723 · 2022-11-22 · ·

A system described herein may provide a technique for the monitoring of one or more devices, such as Internet of Things (“IoT”) devices or other suitable types of devices, via one or more networks. The system may maintain readings associated with the IoT devices, and may identify a demand for a set of readings from a particular IoT device. The system may output a request to the particular IoT device. The request may indicate a maximum data size for a response to the request, as well as an indication of the latest time associated with readings received from the particular IoT device. The IoT device may respond with readings that were collected after the indicated latest time. The response may be restricted to the maximum data size. As such, the IoT device may refrain from providing a full set of readings that were collected after the indicated latest time.

Selective access of multi-rate data from a server and/or peer

Aspects of the disclosed subject matter are directed to facilitating peer-to-peer data exchange in a common domain. In accordance with one embodiment, a method is provided for obtaining content from one or more peers that are connected to the domain. The method includes registering a peer with a super-peer when a connection to the domain is established. Then, the connecting peer obtains data that describes various network conditions and identifies chunks of content available from other peers. In downloading content from other peers, heuristics are applied to select between available chunks that are potentially encoded at different bitrates. The heuristics account for the network conditions between peers and balance the potential need to quickly access content with the desire to obtain high quality content.

Selective access of multi-rate data from a server and/or peer

Aspects of the disclosed subject matter are directed to facilitating peer-to-peer data exchange in a common domain. In accordance with one embodiment, a method is provided for obtaining content from one or more peers that are connected to the domain. The method includes registering a peer with a super-peer when a connection to the domain is established. Then, the connecting peer obtains data that describes various network conditions and identifies chunks of content available from other peers. In downloading content from other peers, heuristics are applied to select between available chunks that are potentially encoded at different bitrates. The heuristics account for the network conditions between peers and balance the potential need to quickly access content with the desire to obtain high quality content.

Task offloading and routing in mobile edge cloud networks
11503113 · 2022-11-15 · ·

A method implemented by a network element (NE) in a mobile edge cloud (MEC) network, comprising receiving, by the NE, an offloading request message from a client, the offloading request message comprising task-related data describing a task associated with an application executable at the client, determining, by the NE, whether to offload the task to an edge cloud server of a plurality of edge cloud servers distributed within the MEC network based on the task-related data and server data associated with each of the plurality of edge cloud servers, transmitting, by the NE, a response message to the client based on whether the task is offloaded to the edge cloud server.

Task offloading and routing in mobile edge cloud networks
11503113 · 2022-11-15 · ·

A method implemented by a network element (NE) in a mobile edge cloud (MEC) network, comprising receiving, by the NE, an offloading request message from a client, the offloading request message comprising task-related data describing a task associated with an application executable at the client, determining, by the NE, whether to offload the task to an edge cloud server of a plurality of edge cloud servers distributed within the MEC network based on the task-related data and server data associated with each of the plurality of edge cloud servers, transmitting, by the NE, a response message to the client based on whether the task is offloaded to the edge cloud server.

INTENT-BASED ORCHESTRATION USING NETWORK PARSIMONY TREES

Novel tools and techniques are provided for implementing intent-based orchestration using network parsimony trees. In various embodiments, in response to receiving a request for network services that comprises desired characteristics and performance parameters for the requested network services without information regarding specific hardware, hardware type, location, or network, a computing system might generate a request-based parsimony tree based on the desired characteristics and performance parameters. The computing system might access, from a datastore, a plurality of network-based parsimony trees that are each generated based on measured network metrics, might compare the request-based parsimony tree with each of one or more network-based parsimony trees to determine a fitness score for each network-based parsimony tree, and might identify a best-fit network-based parsimony tree based on the fitness scores. The computing system might identify and might allocate network resources based on the identified best-fit network-based parsimony tree, for providing the requested network services.

SELECTION OF GATEWAYS FOR RECONNECTION UPON DETECTION OF REACHABILITY ISSUES WITH BACKEND RESOURCES

Described embodiments provide system and methods for selecting a device via which a client is to connect with a server. A client may identify a server and a plurality of devices intermediary to the client and the server via one of which the client is authenticated to connect to access the server using a certificate. The client may detect that the server is unreachable from the client authenticated to use a first connection via a first device of the plurality of devices using the certificate. The client may select, responsive to detecting that the server is unreachable, a second device of the plurality of devices via which the client is to access the server. The client may authenticate, using the certificate used to authenticate with the first device, the client to establish a second connection with the second device to access the server.

Curating proxy server pools
11616848 · 2023-03-28 · ·

A system and method of forming proxy server pools is provided. The method comprises several steps, such as requesting a pool to execute the user's request and retrieving an initial group. The system checks the service history of an initial group, including whether any of the proxy servers in an initial group are exclusive to existing pools. The exclusive proxy servers in an initial group with eligible proxy servers are replaced when needed and new proxy server pools are formed. The system also records the service history of proxy servers and pools before and after the pools are created. The method can also involve predicting the pool health in relation with the thresholds foreseen and replacing the proxy servers below the threshold.

Hybrid deployment of ephemeral scanners
11616803 · 2023-03-28 · ·

A cybersecurity scanner deployment system, comprising: at least one processor configured to: access a primary account maintained in a cloud environment; receive information defining a structure of the primary account, the structure including a plurality of assets, and the information excluding raw data of the primary account; deploy, inside the primary account or a secondary account for which trust is established with the primary account, at least one ephemeral scanner configured to scan at least one block storage volume and output metadata defining the at least one block storage volume, the output excluding raw data of the primary account; receive a transmission of the metadata from the at least one ephemeral scanner, excluding raw data of the primary account; analyze the metadata to identify cybersecurity vulnerabilities; correlate each of the cybersecurity vulnerabilities with one of the assets; and generate a report correlating the cybersecurity vulnerabilities with the assets.