H04L67/1025

Dynamically adjusting load balancing

Some embodiments provide a novel method for load balancing data messages that are sent by a source compute node (SCN) to one or more different groups of destination compute nodes (DCNs). In some embodiments, the method deploys a load balancer in the source compute node's egress datapath. This load balancer receives each data message sent from the source compute node, and determines whether the data message is addressed to one of the DCN groups for which the load balancer spreads the data traffic to balance the load across (e.g., data traffic directed to) the DCNs in the group. When the received data message is not addressed to one of the load balanced DCN groups, the load balancer forwards the received data message to its addressed destination. On the other hand, when the received data message is addressed to one of load balancer's DCN groups, the load balancer identifies a DCN in the addressed DCN group that should receive the data message, and directs the data message to the identified DCN. To direct the data message to the identified DCN, the load balancer in some embodiments changes the destination address (e.g., the destination IP address, destination port, destination MAC address, etc.) in the data message from the address of the identified DCN group to the address (e.g., the destination IP address) of the identified DCN.

NETWORK VIRTUALIZATION OF CONTAINERS IN COMPUTING SYSTEMS
20170272400 · 2017-09-21 ·

Techniques of network virtualization of containers in cloud-based system are disclosed herein. In one embodiment, a method includes receiving a selection of a host in the computer system to instantiate a container in response to a request from a user. In response to the received selection, the method includes identifying parameters of network operations on the selected host to instantiate the requested container and assigning a network address to the container to be instantiated on the selected host in the computer system, the assigned network address is addressable from outside of the selected host without network name translation. The method can then include transmitting an instruction to the selected host to instantiate the requested container based on the assigned network address.

Enabling analytics for a virtualized application
11399057 · 2022-07-26 · ·

Solutions for enabling analytics for a virtualized application leverage reproducibility of information as a substitute for persisting information. Disclosed solutions include: collecting, by a virtualized application, first analytics data on a user equipment (UE); performing, by the virtualized application, a one-way function (e.g., a hash function) on persistent information (e.g., an international mobile equipment identity (IMEI) number) on the UE to generate a unique UE identification (ID); transmitting the first analytics data and the UE ID to a remote node across a network; collecting, by the virtualized application, second analytics data on the UE; and transmitting the second analytics data and the UE ID to the remote node across the network. Because the UE ID is deterministic, it may be generated repeatedly, as needed, (producing the same value each time) to compensate for the inability of the virtualized application to persist the UE ID on the UE.

Enabling analytics for a virtualized application
11399057 · 2022-07-26 · ·

Solutions for enabling analytics for a virtualized application leverage reproducibility of information as a substitute for persisting information. Disclosed solutions include: collecting, by a virtualized application, first analytics data on a user equipment (UE); performing, by the virtualized application, a one-way function (e.g., a hash function) on persistent information (e.g., an international mobile equipment identity (IMEI) number) on the UE to generate a unique UE identification (ID); transmitting the first analytics data and the UE ID to a remote node across a network; collecting, by the virtualized application, second analytics data on the UE; and transmitting the second analytics data and the UE ID to the remote node across the network. Because the UE ID is deterministic, it may be generated repeatedly, as needed, (producing the same value each time) to compensate for the inability of the virtualized application to persist the UE ID on the UE.

LOAD BALANCING DETERMINISTICALLY-SUBSETTED PROCESSING RESOURCES USING FRACTIONAL LOADS
20210382755 · 2021-12-09 ·

Systems and methods are described for load balancing between a set of servers. Subsets of servers from the set of servers are assigned, via deterministic subsetting, to respective clients from a set of clients. Unlike conventional load balancing techniques using deterministic subsetting, the disclosed techniques enable configuring a client to distribute different amounts of load among the servers in its server subset. Techniques for constructing the subsets are also described.

Deterministic mapping and uniform routing of items to physical resources using hash values

A string, identifying an item to be assigned to a physical resource, is hashed to obtain a numeric hash value. The numeric hash value is downscaled to obtain a bucket identifier that identifies a bucket that will hold the numeric hash value. The bucket is then deterministically mapped to a physical resource so that it can be retrieved without accessing a stored data structure representative of the mapping.

Deterministic mapping and uniform routing of items to physical resources using hash values

A string, identifying an item to be assigned to a physical resource, is hashed to obtain a numeric hash value. The numeric hash value is downscaled to obtain a bucket identifier that identifies a bucket that will hold the numeric hash value. The bucket is then deterministically mapped to a physical resource so that it can be retrieved without accessing a stored data structure representative of the mapping.

METHOD FOR PLAYING ON A PLAYER OF A CLIENT DEVICE A CONTENT STREAMED IN A NETWORK
20220191260 · 2022-06-16 ·

The present invention relates to a method for playing on a player of a client device a content streamed in a network comprising a peer-to-peer network of client devices, including: (a) receiving from the player a request for a current segment at a first quality level; (b) determining, as a function of at least one parameter representative of a capacity of said peer-to-peer network, a second quality level; (c) estimating an optimal response delay such that providing the requested current segment at the expiration of said optimal response delay will cause the player to request according to its ABR logic a next segment at said second quality level, as a function of a model predicting the ABR logic of the player; (d) providing the requested current segment from the first buffer at the expiration of said estimated optimal response delay.

APPARATUS AND METHOD FOR CONTROLLING APPLICATION RELOCATION IN EDGE COMPUTING ENVIRONMENT
20220141315 · 2022-05-05 ·

An electronic device and method are disclosed. The electronic device operates in an edge computing environment, and includes: a memory storing an application, a wireless communication circuitry, and at least one processor. The at least one processor implements the method, including: receiving a query message querying whether application relocation is possible from an external server through wireless communication circuitry, identifying, using at least one processor, whether the application relocation is possible based on a running state of the application, in response to receiving the query message, when the application relocation is impossible, transmitting a first response message indicating that the application relocation is impossible to the external server, or when the application relocation is possible, transmitting a second response message indicating that the application relocation is possible to the external server.

Enabling analytics for a virtualized application
11729262 · 2023-08-15 · ·

Solutions for enabling analytics for a virtualized application leverage reproducibility of information as a substitute for persisting information. Disclosed solutions include: collecting, by a virtualized application, first analytics data on a user equipment (UE); performing, by the virtualized application, a one-way function (e.g., a hash function) on persistent information (e.g., an international mobile equipment identity (IMEI) number) on the UE to generate a unique UE identification (ID); transmitting the first analytics data and the UE ID to a remote node across a network; collecting, by the virtualized application, second analytics data on the UE; and transmitting the second analytics data and the UE ID to the remote node across the network. Because the UE ID is deterministic, it may be generated repeatedly, as needed, (producing the same value each time) to compensate for the inability of the virtualized application to persist the UE ID on the UE.