H04L67/1076

System and method of minimizing network bandwidth retrieved from an external network

A system and method are provided of minimizing network bandwidth used from an external network by client peers in a local network. The method can include the operation of organizing a plurality of clients each having media streamlets and a client parent in a structure within the local network. Mapping information propagates through the structure. The mapping information represents local streamlet locations as stored by the plurality of clients. Another operation is retrieving a local streamlet from a client identified in the mapping information as having the local streamlet for the requesting client.

PREDICTIVE OVERLAY NETWORK ARCHITECTURE

The predictive overlay network architecture of the present invention improves the performance of applications distributing digital content among nodes of an underlying network such as the Internet by establishing and reconfiguring overlay network topologies over which associated content items are distributed. The present invention addresses not only frequently changing network congestion, but also interdependencies among nodes and links of prospective overlay network topologies. The present invention provides a prediction engine that monitors metrics and predicts the relay capacity of individual nodes and links (as well as demand of destination nodes) over time to reflect the extent to which the relaying of content among the nodes of an overlay network will be impacted by (current or future) underlying network congestion. The present invention further provides a topology selector that addresses node and link interdependencies while redistributing excess capacity to determine an overlay network topology that satisfies application-specific performance criteria.

EMS assisted fault handling in virtual network function components

An example operation may include a method comprising one or more of receiving a heartbeat failure notification message when a VNFCI is in standby state, building, at a VNFCI, a next state request message with standby and heartbeat failure parameters, sending the next state request message to an EMS, retrieving, at the EMS, a peer VNFCI state when the next state request message is received, sending a next state response message to the VNFCI with active state when one or more of: a peer VNFCI admin state is not online, and when a peer VNFCI is not reachable when the peer VNFCI admin state is online, sending a next state response message with standby state when the peer operational state is active, and sending the next state response message with standby to the VNFCI when the request of current issues on resources associated with the VNFCI from the VNFM is received and there are critical issues at the EMS.

POLICY CONSTRAINT FRAMEWORK FOR AN SDDC

Some embodiments of the invention provide a method for processing requests for performing operations on resources in a software defined datacenter (SDDC). The resources are software-defined (SD) resources in some embodiments. The method initially receives a request to perform an operation with respect to a first resource in the SDDC. The method identifies a policy that matches (i.e., is applicable to) the received request for the first resource by comparing a set of attributes of the request with sets of attributes of a set of policies that place constraints on operations specified for resources. In some embodiments, several sets of attributes for several policies can be expressed for resources at different hierarchal resource levels of the SDDC. The method rejects the received request when the identified policy specifies that the requested operation violates a constraint on operations specified for the first resource.

Facilitating peer-to-peer cloud computing resource sharing utilizing a permissioned distributed ledger

Facilitating peer-to-peer cloud computing resource sharing utilizing a permissioned distributed ledger is provided. A request by a computational resource consumer for additional computational resources from a computational resource provider via a peer-to-peer decentralized network is detected. A computational resource exchange environment is generated to transfer the additional computational resources from the computational resource provider to the computational resource consumer in response to validating that the computational resource consumer is authorized to consume the additional computational resources and that the computational resource provider is authorized to transfer the additional computational resources to the computational resource consumer via the peer-to-peer decentralized network. The additional computational resources are transferred from the computational resource provider to the computational resource consumer for consumption via the computational resource exchange environment. The additional computational resources provided by the computational resource provider and the consumption of the additional computational resources by the computational resource consumer are anonymized.

EMS assisted split-brain resolution in virtual network function components

A method or system, comprising receiving, at a virtual network function component instances (VNFCI), a heartbeat message from a peer VNFCI with current operational state of active, sending the heartbeat message to the peer VNFCI with a current operational state of active, constructing and sending a next state request message to an element management system (EMS) with one or more of: an active parameter, and a split-brain parameter, starting a response timer, sending a heartbeat message to the peer VNFCI with a current operational state of active and a desired operational state of active when a receive next state response message is received and the VNFCI response state is active.

User-based data tiering

Techniques are provided for user-based data tiering. In an example, a computer maintains a first-in-first-out queue that logs a finite set of users that have most-recently modified a file. This queue can be maintained in an extended attribute of an inode that corresponds to a file. A computer can also maintain a policy that defines how to perform storage tiering on a file based on which users have accessed the file. When a tiering operation is performed, the files specified by a corresponding tiering policy can be evaluated for which users have recently accessed them. When a user specified by the tiering policy has recently modified a file, the file can be placed in tiering queue for tiering.

Information processing apparatus and method for processing information
11445015 · 2022-09-13 · ·

It is desired to make it possible to verify data more properly while effectively utilizing resources. There is provided an information processing apparatus including a verification unit that verifies predetermined data using first data obtained from the predetermined data and second data obtained from a P2P database.

ADJUSTING PARAMETERS OF A TRANSMISSION IN RESPONSE TO INTERFERENCE
20220322416 · 2022-10-06 ·

Methods and apparatuses for determining whether to perform transmissions or receptions. A method for a user equipment (UE) to determine whether to perform the transmissions includes receiving a n for a search space set for receptions of physical downlink control channels (PDCCHs) according to a common search space (CSS) and receiving a PDCCH that includes a downlink control information (DCI) format. The method includes determining a set of time resources and a set of frequency resources based on an indication in the DCI format and canceling a transmission of a sounding reference signal (SRS) in time resources from the set of time resources based on determining that the SRS transmission would include frequency resources from the set of frequency resources. The method includes transmitting a physical uplink control channel in time resources from the set of time resources and in frequency resources from the set of frequency resources.

METHODS AND APPARATUSES FOR TRANSMITTING MESSAGES

One or more embodiments of this specification provide methods and apparatuses for transmitting messages. A method includes: determining a blockchain message from two or more message queues stored in a relay node in a blockchain relay communication network based on a message transmission policy, the message transmission policy being configured to transmit blockchain messages in the blockchain relay communication network based upon a priority identifier representing a priority of a blockchain message to be transmitted in the blockchain relay communication network; obtaining identifier from the blockchain message, and determining one or more target blockchain nodes in the blockchain relay communication network corresponding to the identifier; determining a target relay node connected to the one or more target blockchain nodes in the blockchain relay communication network; and transmitting the blockchain message to the one or more target blockchain nodes through the target relay node.