H04L67/1019

Controlled cross-cell migration of data in cell-based distributed computing architecture

Systems and methods are described for controlled migration of workloads between cell systems arranged in a cell-based architecture. Each cell system can implement a portion of an overall workload of the architecture, which may represent a network-accessible service. The isolation provided by cells may prevent widespread problems at the service, but may also conceal errors that might occur should workloads between the cells be redistributed. Such redistribution is often forced at inopportune moments, such as when a cell of the service has already failed. Systems and methods described herein enable detection of such errors by repeatedly migrating portions of workloads between cells. The system can monitor health information during or between migrations to ensure continued health of the service. If the service appears to be unhealthy after a migration, future migrations can be halted to enable a cause of the unhealthy state to be identified and rectified.

System and method for cloud-based analytics

A system and method in accordance with example embodiments may include systems and methods for a cloud-based analytics platform. The cloud-based analytics platform may allow the manual and automatic uploading to and/or downloading from a cloud server. The platform may include single sign-on (SSO) capabilities such that a user may have one set of credentials to access data from the cloud-based analytics and/or data stored locally. The platform may include data validation and processing in order to provide real-time feedback on uploads based on file type, file size, access rights, extracted data, and transformed data.

EFFICIENT DATA FORWARDING IN A NETWORKED DEVICE

A method for network communication is provided. The method includes assigning a first network port identifier for return communication to a packet that originates on a node of the network device and determining whether the packet has a destination internal or external to the network device. The method includes translating the first network port identifier for return communication to a second network port identifier that is within a range of network port identifiers specific to the node, responsive to determining the packet has the external destination, and sending the packet from the node of the network device to the external destination, with the packet having the second network port identifier for return communication.

System and method for routing service requests

A computer-implemented method routes service requests to services in a service framework provided by a plurality of hosts. The method comprises receiving a service request for a service in the service framework and discovering a plurality of candidate hosts that host the service. The plurality of candidate hosts are a subset of the plurality of hosts. The method further comprises selecting a candidate host from the plurality of candidate hosts based on measured latencies for the plurality of candidate hosts and routing the service request to the selected candidate host.

Workload balancing technique for a telephone communication system

A workload balancing technique enhances balancing of workloads processed by components of a telephone communication system configured to render telephony services over a computer network. The telephony services illustratively include private branch exchange (PBX) services suitable for customers with geographically dispersed telephone service demands. The workload balancing technique is invoked by the communication system to reduce contention among the components of the system, such as telephone access servers (TASes) coupled to a proxy router, when servicing telephony requests issued by the customers, thus enabling rendering of the telephony services in an efficient and cost-effective manner. As described herein, an available TAS is randomly selected to service a telephony request received by the proxy router from a network coupled to the communication system.

Automatic discovery, scaling, and load balancing of multiple cloud data centers in a software-defined network environment
10567288 · 2020-02-18 · ·

In general, techniques are disclosed for automatic discovery and load balancing of virtual service instances of a plurality of cloud data centers within a Software Defined Networking (SDN) or a Network Functions Virtualization (NFV) environment. In one example, a global load balancing device (GLB) of a first cloud data center receives, from an SDN controller, address information for a first set of virtual service instances provided by the first cloud data center and a hostname of a domain for which to perform load balancing across the plurality of cloud data centers. The GLB device requests, from a domain name server (DNS) for the domain, address information for other sets of virtual service instances provided by other cloud data centers. Further, the GLB device applies a load balancing algorithm to direct network traffic to one or more of the virtual service instances provided by the plurality of cloud data centers.

A MULTI-CLIENT/MULTI-SERVER MANAGING METHOD AND SYSTEM

A method for managing a multi-client/multi-server system or network (1) is disclosed. According to some embodiments, the method comprises the following steps: when at least one of the servers (3) receives a request for connection from one of the clients (5), the server (3) calculates a figure of merit (FoM) for the requesting client; the server (3) sends a connection-accepting response to the requesting client (5) with a probability, which depends upon the figure of merit; the requesting client (5) receiving a connection-accepting response joins the server (3) and starts communication therewith.

Shuffle sharded load balancing
10530845 · 2020-01-07 · ·

A system includes a plurality of computing devices configurable to implement a compute instance of a provider network. A computing device is configured to implement a load balancer that allocates the computing devices to service requests received by the load balancer. The load balancer configured to receive service requests from a plurality of sources, to extract a parameter from each received service request, to select, based on the parameter, a first subset of the plurality of computing devices to be used to service the request, and to forward the request to a selected computing device of the first subset of the computing devices for service.

SYSTEMS AND METHODS OF PROVIDING ACCESS TO SECURE DATA
20190286836 · 2019-09-19 ·

The disclosed technology includes techniques for secure access to data associated with an organization and includes providing a user device access to a user interface that is configurable by a user of the user device to execute function requests. Upon receipt of a function request, a router can randomly select an available computer from a computer cluster to execute the function. The computer can access a predetermined portion of the organization's data, generate an output by executing the requested function based on the predetermined portion of the organization's data, and transmit the output to the user device.

Sharing cryptographic session keys among a cluster of network security platforms monitoring network traffic flows
11991268 · 2024-05-21 · ·

A first example network security platform disclosed herein is to store a cryptographic session key from a server, the cryptographic session key associated with an encrypted network traffic flow between the server and a client different from the first network security platform. This disclosed first example network security platform is also to access a query from a second network security platform requesting the cryptographic session key, and generate a response including the cryptographic session key to send to the second network security platform.