H04L67/1017

MIGRATING QUANTUM SERVICES BASED ON TEMPERATURE THRESHOLDS
20230196177 · 2023-06-22 ·

Migrating quantum services based on temperature thresholds is disclosed herein. In one example, a first processor device of a first quantum computing device determines that a temperature of a second quantum computing device has exceeded a temperature threshold. The first processor device identifies a quantum service, executing on the second quantum computing device, for migration, and identifies a third quantum computing device of the quantum computing system as a migration destination for the quantum service. The first processor device of the first quantum computing device configures the second quantum computing device to place the quantum service in an inactive state, and transfers the quantum service from the second quantum computing device to the third quantum computing device. The first processor device then initiates execution of the quantum service on the third quantum computing device.

MIGRATING QUANTUM SERVICES BASED ON TEMPERATURE THRESHOLDS
20230196177 · 2023-06-22 ·

Migrating quantum services based on temperature thresholds is disclosed herein. In one example, a first processor device of a first quantum computing device determines that a temperature of a second quantum computing device has exceeded a temperature threshold. The first processor device identifies a quantum service, executing on the second quantum computing device, for migration, and identifies a third quantum computing device of the quantum computing system as a migration destination for the quantum service. The first processor device of the first quantum computing device configures the second quantum computing device to place the quantum service in an inactive state, and transfers the quantum service from the second quantum computing device to the third quantum computing device. The first processor device then initiates execution of the quantum service on the third quantum computing device.

Secure communications of storage tenants that share a storage cluster system
11516291 · 2022-11-29 · ·

A first set of one or more tenant communication components are configured to communicate with a first separate system component of a first storage tenant via a first virtual network. A second set of one or more tenant communication components are configured to communicate with a second separate system component of a second storage tenant via a second virtual network. The second virtual network is separate from the first virtual network. A plurality of tenant communication components of the storage cluster system including the first set of one or more tenant communication components and the second set of one or more tenant communication components are configured to communicate internally in the storage cluster system via a third virtual network separate from the first virtual network and the second virtual network.

Secure communications of storage tenants that share a storage cluster system
11516291 · 2022-11-29 · ·

A first set of one or more tenant communication components are configured to communicate with a first separate system component of a first storage tenant via a first virtual network. A second set of one or more tenant communication components are configured to communicate with a second separate system component of a second storage tenant via a second virtual network. The second virtual network is separate from the first virtual network. A plurality of tenant communication components of the storage cluster system including the first set of one or more tenant communication components and the second set of one or more tenant communication components are configured to communicate internally in the storage cluster system via a third virtual network separate from the first virtual network and the second virtual network.

INFORMATION PROCESSING APPARATUS AND LOAD DISTRIBUTION CONTROL METHOD
20170346886 · 2017-11-30 · ·

An information processing apparatus comprising a first processor configured to, for each of a plurality of control apparatuses, determine weights to be used for distribution of requests for predetermined processing so that a larger amount of requests for the predetermined processing is distributed to a control apparatus controlling a larger number of destination apparatuses. Each of the plurality of control apparatuses includes a second processor configured to: receive a request distributed to own control apparatus; perform the predetermined processing according to the request; create a message; transmit the message to a destination apparatus that is a destination of the message when a control apparatus controlling the destination apparatus is the own control apparatus; and forward the message to another control apparatus when the control apparatus controlling the destination apparatus that is a destination of the message is the other control apparatus.

Internet protocol version 6 content routing

A content delivery system includes a cache server, a domain name server, and a redirector. The domain name server is configured to receive a request for a cache server address, and provide an IPv6 anycast address. The redirector is configured to receive a content request addressed to the IPv6 anycast address from a client system, receive load information from the cache server, and determine if the cache server is available. The redirector is further configured to forward the content request to the cache server when the cache server is available. The cache server is configured to receive the content request forwarded from the redirectors, send a response to the content request to a client system, the response including an IPv6 unicast address of the cache server as a source address, an IPv6 unicast address of the client system as a destination address, and the IPv6 anycast address as a home address, and provide the content to the requestor.

Method and apparatus for load balancing in network based telephony application

Techniques are disclosed for load balancing in networks such as those networks handling telephony applications. By way of example, such techniques direct requests associated with calls to servers in a system comprised of a network routing calls between a plurality of callers and at least one receiver wherein a load balancer sends requests associated with calls to a plurality of servers as follows. A request associated with a call, a caller, or a receiver is received, depending on the particular load balancing technique. A server is selected to receive the request. A subsequent request is received. A determination is made whether or not the subsequent request is associated with the call, the caller, or the receiver, depending on the particular load balancing technique. The subsequent request is sent to the server based on determining that the subsequent request is associated with the call, the caller, or the receiver, again depending on the particular load balancing technique.

Method and system for load balancing over a cluster of authentication, authorization and accounting (AAA) servers
09749404 · 2017-08-29 · ·

A method and system for load balancing over a cluster of authentication, authorization and accounting (AAA) servers. The method performs a distribution of AAA requests among AAA servers having an active AAA connection with an AAA client. The method includes establishing TCP connections with a plurality of AAA servers, using a TCP connection request received from at least one AAA client; opening AAA connections with a plurality of AAA servers, using an AAA connection request received from at least one AAA client, and distributing AAA requests to AAA servers with an active AAA connection according to a predefined load balancing algorithm. The invention is further capable of multiplexing outbound messages and requests received from a plurality of AAA servers. The AAA protocol supported by the invention includes, but is not limited to, a Diameter protocol, a lightweight directory access protocol (LDAP), and the likes.

Management of IoT Devices in a Virtualized Network
20170235585 · 2017-08-17 ·

Specialized, service optimized virtual machines are assigned to handle specific types of Internet of Things (IoT) devices. An IoT context mapping policy engine within the context of a virtualized network function manages IoT context mapping policy functions in load balancers. The IoT context mapping policy functions select service optimized virtual machines based on IoT device IDs, and assign those virtual machines to handle the devices. The IoT context mapping policy functions provide load data to the IoT context mapping policy engine. Based on the load data, the IoT context mapping policy engine maintains appropriate scaling by creating or tearing down instances of the virtual machines.

Routing of communications to one or more processors performing one or more services according to a load balancing function

The present disclosure identifies topologies of a computer network where one network appliance may be configured as a master network appliance and where that master network appliance may communicate over a network communication interface with one or more slave network appliances. Computer networks of the present disclosure may include a switch and a firewall where the switch may be coupled to several network appliances via different network communication interfaces.