H04L67/1023

SYSTEM AND METHOD FOR PROVIDING RELIABLE AND EFFICIENT DATA TRANSFER
20170346924 · 2017-11-30 · ·

Systems and methods for providing reliable and efficient data transfer involving a user browser configured to run JavaScript which permits a user browser to communicate with components of a media distribution system. The user browser may request specific media content on the company website which may inform components of the media distribution system of the request. To facilitate the downloading of the requested media content, components of the media distribution system may arrange for the generation of a torrent files, informing the user browser where the requested media content may be downloaded. A fake torrent file may be generated and distributed to the user browser to permit viewing of the media content before generation of a real torrent file is possible. Upon receiving the torrent files, a user may download and play the media content.

Systems and Methods for Parallel and Scalable Processing of Telemetry Data from Connected Dispensing Machines
20170346923 · 2017-11-30 · ·

The present disclosure is directed to systems and methods for parallel and scalable processing of messages containing telemetry data at an administrator system. The administrator system can receive a large number of messages containing telemetry data from many dispenser machines in a short amount of time. To receive and process those messages, the systems and methods of the present disclosure provide a message queuer to queue the messages (or at least the telemetry data in the messages) in a plurality of queues and a different thread or process for each of the plurality of queues. Each thread or process can pull messages out of its assigned queue in order and process the telemetry data of the messages. The threads or processes can run on one or more central processing unit cores at the administrator system. This setup allows for horizontal scaling in terms of message processing throughput.

Multi-cluster ingress

A method for load balancing application requests across a multi-cluster container orchestration system includes receiving a load-balancing configuration for a multi-cluster service managing access to a set of destination clusters hosting a software application deployed by a user. The multi-cluster service uses the load-balancing configuration to load balance application level traffic across the set of destination clusters. Each destination cluster includes at least one container executing the software application and a respective geographical region. The method also includes receiving an application level request directed toward the software application hosted across the destination clusters. The application level request is received from a client and includes a host name and a geographical location associated with the client. The method also includes routing the request to one of the clusters based on the geographical location of the request and the respective geographical locations of the clusters.

Multi-cluster ingress

A method for load balancing application requests across a multi-cluster container orchestration system includes receiving a load-balancing configuration for a multi-cluster service managing access to a set of destination clusters hosting a software application deployed by a user. The multi-cluster service uses the load-balancing configuration to load balance application level traffic across the set of destination clusters. Each destination cluster includes at least one container executing the software application and a respective geographical region. The method also includes receiving an application level request directed toward the software application hosted across the destination clusters. The application level request is received from a client and includes a host name and a geographical location associated with the client. The method also includes routing the request to one of the clusters based on the geographical location of the request and the respective geographical locations of the clusters.

Optimization of application layer traffic carried by an IP connection over a mobile network

In an embodiment, there is provided a method for optimization of application layer traffic carried by an IP connection over a multi-access technology mobile network between a User Equipment UE and an IP connection endpoint in an IP network, the optimization being based on network information provided using a network information service, the network information including path costs capable of indicating preferences in terms of network paths for the IP connection, the preferences in terms of network paths including preferences in terms of access technologies.

Network flow attribution in service mesh environments

In one embodiment, a monitoring engine obtains mesh flow data for traffic flows between nodes in a service mesh. The monitoring engine associates the mesh flow data with network traffic between an endpoint device and an edge of the service mesh. The monitoring engine identifies, based on the mesh flow data, a particular container workload associated with the traffic flows. The monitoring engine provides an indication that the particular container workload is associated with the network traffic between the endpoint device and the edge of the service mesh.

Network flow attribution in service mesh environments

In one embodiment, a monitoring engine obtains mesh flow data for traffic flows between nodes in a service mesh. The monitoring engine associates the mesh flow data with network traffic between an endpoint device and an edge of the service mesh. The monitoring engine identifies, based on the mesh flow data, a particular container workload associated with the traffic flows. The monitoring engine provides an indication that the particular container workload is associated with the network traffic between the endpoint device and the edge of the service mesh.

DISTRIBUTED RESILIENT LOAD-BALANCING FOR MULTIPATH TRANSPORT PROTOCOLS

Techniques are described for providing a distributed application load-balancing architecture that supports multipath transport protocol for client devices connecting to an application service. Rather than having client devices generate new network five-tuples for new subflows to the application servers, the techniques described herein include shifting the burden to the application servers to ensure that the new network five-tuples land in the same bucket in the consistent hashing table. The application servers may receive a hashing function utilized by the load balancers to generate the hash of the network five-tuple. By having the application servers generate the hashes, the load balancers are able to continue stateless, low-level processing of the packets to route them to the correct application servers. In this way, additional subflows can be opened for client devices according to a multipath transport protocol while ensuring that the subflows are routed to the correct application server.

DISTRIBUTED RESILIENT LOAD-BALANCING FOR MULTIPATH TRANSPORT PROTOCOLS

Techniques are described for providing a distributed application load-balancing architecture that supports multipath transport protocol for client devices connecting to an application service. Rather than having client devices generate new network five-tuples for new subflows to the application servers, the techniques described herein include shifting the burden to the application servers to ensure that the new network five-tuples land in the same bucket in the consistent hashing table. The application servers may receive a hashing function utilized by the load balancers to generate the hash of the network five-tuple. By having the application servers generate the hashes, the load balancers are able to continue stateless, low-level processing of the packets to route them to the correct application servers. In this way, additional subflows can be opened for client devices according to a multipath transport protocol while ensuring that the subflows are routed to the correct application server.

DISTRIBUTED PACKET DEDUPLICATION
20220368611 · 2022-11-17 ·

Introduced here are network visibility appliances capable of implementing a distributed deduplication scheme by routing traffic amongst multiple instances of a deduplication program. Data traffic can be forwarded to a pool of multiple network visibility appliances that collectively ensure no duplicate copies of data packets exist in the data traffic. The network visibility appliances can route the traffic to different instances of the deduplication program so that duplicate copies of a data packet are guaranteed to arrive at the same instance of the deduplication program, regardless of which network visibility appliance(s) initially received the duplicate copies of the data packet.