H04L67/1076

System for triggering resource channel mapping for dynamic authentication
11689617 · 2023-06-27 · ·

Systems, computer program products, and methods are described herein for triggering resource channel mapping for dynamic authentication. The present invention is configured to receive, from a user input device, a request from a user to access resources via a first resource channel; retrieve information associated with the user; query a resource channel repository using the information associated with the user; retrieve, from the resource channel repository, information associated with a second resource channel based on at least the query, wherein the second resource channel is associated with the user; in response, automatically trigger a resource channel mapping engine; map, using the resource channel mapping engine, the second resource channel and the first resource channel; and in response, authorize the request to access the resources via the first resource channel.

Automatic scaling of resource instance groups within compute clusters

A service provider may apply customer-selected or customer-defined auto-scaling policies to a cluster of resources (e.g., virtualized computing resource instances or storage resource instances in a MapReduce cluster). Different policies may be applied to different subsets of cluster resources (e.g., different instance groups containing nodes of different types or having different roles). Each policy may define an expression to be evaluated during execution of a distributed application, a scaling action to take if the expression evaluates true, and an amount by which capacity should be increased or decreased. The expression may be dependent on metrics emitted by the application, cluster, or resource instances by default, metrics defined by the client and emitted by the application, or metrics created through aggregation. Metric collection, aggregation and rules evaluation may be performed by a separate service or by cluster components. An API may support auto-scaling policy definition.

Content distribution using ad hoc mesh networks.
20170359412 · 2017-12-14 ·

Aspects discussed herein relate to systems, apparatuses, and methods for providing content distribution via a breadth-first approach for peer-to-peer file sharing in a temporary ad hoc mesh network. For example, a peer-to-peer orchestrator may receive requests for the same asset from multiple mobile devices, determine which of the mobile devices are likely to travel along the same route at the same time, group them together and cause transmission of different asset parts of the requested asset to different mobile devices in the group. If the mobile devices in the group lose connection with the peer-to-peer orchestrator, they may form an ad hock mesh network and retrieve asset parts from one another. If the group reconnects with a peer-to-peer orchestrator, additional asset parts of the asset may be transmitted to the group and the process may repeat so that each mobile device may obtain each of the asset parts.

MULIT-MOBILE CORE NETWORKS AND VALUE-ADDED SERVICES

A method is provided in one example embodiment and includes receiving at a network element a packet associated with a flow and determining whether a flow cache of the network element includes an entry for the flow indicating a classification for the flow. The method further includes, if the network element flow cache does not include an entry for the flow, punting the packet over a default path to a classifying service function, in which the classifying service function classifies the flow and determines a control plane service function for handling the flow, and receiving from the classifying service function a service path identifier (“SPI”) of a service path leading to the determined control plane service function. The flow is subsequently offloaded from the classifying service function to the network element.

Autonomous management of resources by an administrative node network
11683213 · 2023-06-20 · ·

Autonomous management of resources by an administrative node network is disclosed, including: receiving, at a first node of a plurality of nodes associated with an administrative node network, a resource request directed to the administrative node network, wherein the administrative node network is associated with managing a set of resources; obtaining a first proposal with respect to the resource request; obtaining a second proposal with respect to the resource request from a second node of the plurality of nodes associated with the administrative node network; and determining a processing consensus associated with the resource request based at least in part on the first proposal and the second proposal.

Distributed software defined networking
09843624 · 2017-12-12 · ·

The Distributed Software Defined Network (dSDN) disclosed herein is an end-to-end architecture that enables secure and flexible programmability across a network with full lifecycle management of services and infrastructure applications (fxDeviceApp). The dSDN also harmonizes application deployment across the network independent of the hardware vendor. As a result, the dSDN simplifies the network deployment lifecycle from concept to design to implementation to decommissioning.

Hierarchical Structures of Online Computation for Connected Vehicles
20170353548 · 2017-12-07 ·

The disclosure includes implementations for executing one or more computations for a vehicle. Some implementations of a method for a vehicle may include identifying one or more computations as being un-executable by any processor-based computing device of the vehicle. The method may include generating a query including query data describing the one or more computations to be executed for the vehicle. The method may include providing the query to a network. The method may include receiving a response from the network. The response may include solution data describing a result of executing the one or more computations. The response may be provided to the network by a processor-based computing device included in a hierarchy of processor-based computing devices that have greater computational ability than any processor-based computing devices of the vehicle.

MECHANISM FOR OVERLAY VIRTUAL NETWORKING
20170346892 · 2017-11-30 ·

A method and system for virtual networking is provided. The method includes receiving logical service chain data describing a source virtual network ID (VNID) for a source virtual network, a destination VNID for a destination virtual network, and a group of intermediate waypoints. The logical service chain data defines a logical service chain. A set of networked virtual environments (NVE) is selected to support the group of intermediate waypoints and the logical service chain is deployed and mapped to a physical service chain implemented on the set of NVEs. The logical service chain data is transmitted to a network virtual authority (NVA) and a packet forwarding mechanism is introduced when a packet is received from an overlay port or an underlay port. An associated IP address is requested and the first packet is analyzed.

Content distribution using ad hoc mesh networks

Aspects discussed herein relate to systems, apparatuses, and methods for providing content distribution via a breadth-first approach for peer-to-peer file sharing in a temporary ad hoc mesh network. For example, a peer-to-peer orchestrator may receive requests for the same asset from multiple mobile devices, determine which of the mobile devices are likely to travel along the same route at the same time, group them together and cause transmission of different asset parts of the requested asset to different mobile devices in the group. If the mobile devices in the group lose connection with the peer-to-peer orchestrator, they may form an ad hock mesh network and retrieve asset parts from one another. If the group reconnects with a peer-to-peer orchestrator, additional asset parts of the asset may be transmitted to the group and the process may repeat so that each mobile device may obtain each of the asset parts.

Peer-to-peer distribution of radio protocol data for software defined radio (SDR) updates

Updated radio protocol data may be propagated in a peer-to-peer (P2P) distribution scheme so that peer devices that are incompatible with a particular radio protocol may be dynamically re-configured to communicate with other devices using the particular radio protocol. A remote server(s) may push updated radio protocol data to a hub device, which thereafter disseminates the radio protocol data to other peer devices. These peer devices can forward the data to downstream peer devices, and so on, without further intervention by the remote server(s) that initiated the distribution. The transfer of radio protocol data over P2P connections may occur using a broadcasting technique where, prior to the transfer, a device in possession of the radio protocol data broadcasts an indication to nearby peer devices, which can receive the broadcast and indicate to the broadcaster whether they are ready to receive the radio protocol data.