Patent classifications
H04L67/1023
DISTRIBUTED PACKET DEDUPLICATION
Introduced here are network visibility appliances capable of implementing a distributed deduplication scheme by routing traffic amongst multiple instances of a deduplication program. Data traffic can be forwarded to a pool of multiple network visibility appliances that collectively ensure no duplicate copies of data packets exist in the data traffic. The network visibility appliances can route the traffic to different instances of the deduplication program so that duplicate copies of a data packet are guaranteed to arrive at the same instance of the deduplication program, regardless of which network visibility appliance(s) initially received the duplicate copies of the data packet.
NETWORK MAPPING IN CONTENT DELIVERY NETWORK
A computer-implemented method in a content delivery network (CDN) having multiple delivery servers. The CDN delivers content on behalf of at least one content provider. Distinct delivery servers are logically grouped into delivery server groups. One or more CDN name servers are associated with some of the delivery server groups. Network map data are determined using network data determined by the CDN name servers associated with at least some of the deliver server groups. The network data with respect to a CDN name server relative to a resolver is based on an estimated popularity of that CDN name server for that resolver. Responsive to a client request, including a hostname associated with a content provider, at least one CDN name server determines, using network map data, at least one delivery server to process the client request.
DATA PROCESSING SYSTEM, COMPUTING NODE, AND DATA PROCESSING METHOD
A data processing system, a computing node, and a data processing method are provided. The data processing system includes a management node and a first class of computing nodes. The management node is configured to allocate first processing tasks to the first class of computing nodes. At least two computing nodes in the first class of computing nodes concurrently perform the first processing tasks allocated by the management node. A computing node performs a combine2 operation and a reduce2 operation on a data block M.sub.x and a data block V.sub.1x, to obtain a first intermediate result. Then, the management node obtains a processing result for a to-be-processed dataset according to first intermediate results obtained by the first class of computing nodes. According to the data processing system, when a combine operation and a reduce operation are being performed on data blocks, memory space occupied by computation can be reduced.
SYSTEMS AND METHODS FOR NETWORK SLICE ATTACHMENT AND CONFIGURATION
A method for slice attachment and configuration, the method comprises: receiving a service request from a user equipment; selecting a second network node to process the service request; receiving a configuration for a network slice to enable the service requested by the user equipment; identifying a first point of presence to receive user plane information corresponding to the network slice; identifying a second point of presence to receive control plane information corresponding to the network slice; forwarding traffic corresponding to the network slice to a third point of presence; transmitting to the user equipment a handle identifying the user equipment context and the network slice configuration; and transmitting to the user equipment a user equipment configuration corresponding to the network slice.
APPLICATION-BASED ELASTIC RESOURCE PROVISIONING IN DISAGGREGATED COMPUTING SYSTEMS
Various embodiments for elastic resource provisioning in a disaggregated cloud computing environment, by a processor device, are provided. Respective members of pools of hardware resources within the disaggregated cloud computing environment are provisioned to a tenant according to an application-level service level agreement (SLA). Upon detecting a potential violation of the application-level SLA, additional respective members of the pools of hardware resources are provisioned on a component level to the tenant to avoid a violation of the SLA by one of a scale-up process and a scale-out process.
Machine to machine (M2M) data transfer between data servers
A system includes a first data server storing a first data file for a user and a second data server storing a second data file for the user, wherein a pre-authorized secure connection can be established between the first data server and the second data server. The second data file receives a request for a first amount of data from the second data file and detects that the first amount of data is larger than a second amount of data in the second data file. The second user determines that the first data file at the first data server includes a third amount of data that equals or exceeds a difference between the first amount and the second amount, and receives a fourth amount of data that equals the difference from the first data server over the pre-authorized connection. In response, the second data server processes the request.
Machine to machine (M2M) data transfer between data servers
A system includes a first data server storing a first data file for a user and a second data server storing a second data file for the user, wherein a pre-authorized secure connection can be established between the first data server and the second data server. The second data file receives a request for a first amount of data from the second data file and detects that the first amount of data is larger than a second amount of data in the second data file. The second user determines that the first data file at the first data server includes a third amount of data that equals or exceeds a difference between the first amount and the second amount, and receives a fourth amount of data that equals the difference from the first data server over the pre-authorized connection. In response, the second data server processes the request.
SYSTEM AND METHODS FOR OPTIMAL ALLOCATION OF MULTI-TENANT PLATFORM INFRASTRUCTURE RESOURCES
A system and associated processes to enable a multi-tenant platform operator or administrator to make more optimal decisions with regards to the allocation of platform infrastructure resources (such as computational capabilities, data storage, etc.) among one or more tenants or accounts. In some embodiments, the inventive methods construct a data “signature” for a set of identified users, accounts, or tenants, where the signature contains data regarding the user, account, or tenant's “consumption” of platform infrastructure resources.
LOAD BALANCING ORIGIN SERVER REQUESTS
Disclosed herein are enhancements for operating a content delivery network to load balance origin requests to origin servers. In one implementation, a method of operating a content delivery network comprising a plurality of cache nodes that cache content between end user devices and origin servers includes, in a first cache node of the plurality of cache nodes, obtaining distribution information indicative of how each cache node in the plurality of cache nodes has distributed content requests to the origin servers. The method further provides, in the first cache node maintaining a load balancing profile for the plurality of origin servers based on the distribution information, and distributing a content request to an origin server in the plurality of origin servers based at least in part on the load balancing profile for the plurality of origin servers.
Data client
Facilitating the distribution of content is disclosed. A request for content is received from a requesting peer. A peer type of the requesting peer is determined. Determining the peer type of the requesting peer includes determining whether the requesting peer is a regular peer or a lightweight peer. A regular peer is one that is able to accept incoming connection requests and initiate connections. A lightweight peer is one that has less functionality than the regular peer.