Patent classifications
H04L12/26
MANAGING LARGE VOLUMES OF EVENT DATA RECORDS
A network device that operates as an analysis platform for analysis of event data records that can provide a flexible approach to event data record aggregation. For example, aggregation can be flexibly turned on or off and dynamically adjusted based on event record volume and other factors such as network capacity or throughput. Devices that are instructed to aggregate records can also be instructed to archive the raw records, e.g., to maintain a full fidelity log of events. Devices can further be instructed to utilize a mixed queue approach to determine an order to deliver those records that includes both older records and newer records.
DATA PACKET STORE, FORWARD, AND MONITORING FUNCTIONALITY FOR NETWORK NODE OR MODEM
Techniques are described for wireless communication. A method of wireless communication includes receiving from an application server, at a network node of a wireless communication system, an indication of data to be delivered to at least one wireless device; determining a handling of the data; and transmitting at least one report relating to the handling of the data to the application server. Another method of wireless communication includes receiving from an application processor of a wireless device, at a modem of the wireless device, a request to receive at least one report on events monitored at the modem; and transmitting the at least one report to the application processor.
MODIFIED CONSENSUS PROTOCOL FOR ELIMINATING HEARTBEAT NETWORK TRAFFIC
A computing system in data communication with a plurality of nodes that make up a distributed computing cluster can detect an absence of communication from a node of the plurality of nodes over a time period that exceeds a predefined threshold time period. The computing system can query an instance of a central topology manager for the plurality of nodes regarding liveness of the node from which the absence of communication was detected and can attempting to re-initiate communication with the node when the instance of the central topology manager indicates that the node is live.
AUTOMATED SENSING OF NETWORK CONDITIONS FOR DYNAMICALLY PROVISIONING EFFICIENT VPN TUNNELS
Provided is a process including: executing a virtual private network client application on a client computing device; communicating between the client computing device and a virtual private network server; sensing network conditions of a virtual private network connection; and selecting a set of configuration settings from among the different respective sets of configuration settings based on the network conditions.
TUNABLE LOW COST NETWORK
Aspects of the subject disclosure may include, for example, a method comprising providing services over a network to a device, and constructing device capability and usage profiles. A level of service quality for the device is adjusted by adjusting a latency criterion regarding connection of the device to the network; adjusting a speed of transmissions to or from the device; and altering a routing of transmissions to or from the device. The network can be partitioned so that the adjusted service quality level is provided by a network portion having a predetermined level of resources. The adjusted service quality level can comprise a first level while the device is active and a second level while the device is inactive; the first level is higher than the second level. The first and second levels are lower than a service quality level provided by another network portion. Other embodiments are disclosed.
NETWORK EVALUATION PROGRAM, NETWORK EVALUATION METHOD, AND NETWORK EVALUATION DEVICE
A non-transitory computer-readable storage medium storing therein a network evaluation program for causing a computer to execute a process comprising deploying, in each physical machine of a system in which one or more physical machines and one or more physical storage devices are connected via a physical path, a first virtual machine to execute software of applying a steady access load with respect to the physical storage device or a second virtual machine to execute software of applying a fluctuating access load with respect to the physical storage device, and identifying a plurality of the virtual machines that share a same physical path, based on a measurement result of throughput for a case where at least one or more of the second virtual machines and one or more of the first virtual machines have been executed in a same time period.
SYSTEMS AND METHODS FOR PREVENTING DENIAL OF SERVICE ATTACKS UTILIZING A PROXY SERVER
Aspects of the present disclosure involve systems, methods, computer program products, and the like, for utilizing an access log of a proxy server device of a content delivery network (CDN) to detect and mitigate a denial of service (DOS) on a web or content server hosted by the CDN. Through an analysis of the content requests received at the proxy server listed in the access logs, one or more IP addresses may be identified as involved in a potential DOS attack or other suspicious behavior. Once identified, the suspicious activities of the one or more IP addresses may be tracked and aggregated over a particular period of time, with each detected suspicious request to the content server being counted. The count of suspicious requests to the content server may then be compared to one or more threshold values and a remediation action may occur when the thresholds are met or exceeded.
DYNAMIC MONITORING AND MANAGEMENT IN WIRELESS SYSTEMS
The present disclosure generally discloses dynamic monitoring and management capabilities for use in wireless communication systems. The dynamic monitoring and management capabilities may be configured to support dynamic monitoring and management within various types of contexts and associated environments. The dynamic monitoring and management capabilities may include feedback collection capabilities, service quality evaluation capabilities, parameter tuning capabilities, or the like, as well as various combinations thereof.
METHOD AND APPARATUS FOR OPTIMIZING DATA TRANSFERS UTILIZING MACHINE LEARNING
In one embodiment, a method includes receiving at a network device comprising a data transfer optimization module, input identifying a source directory comprising data and a target directory at a storage device, splitting the data into a plurality of data groups for transfer to the storage device, transmitting the data groups concurrently to the storage device on data paths wherein transfer times of the data groups are monitored, receiving at the data transfer optimization module, identification of a data group with a longest transfer time, splitting the data group with the longest transfer time, and placing the data from the data group into at least two of the data groups for transfer to the storage device. An apparatus and logic are also disclosed herein.
LOAD BALANCING BACK-END APPLICATION SERVICES UTILIZING DERIVATIVE-BASED CLUSTER METRICS
Some embodiments include a back-end routing engine. The engine can receive traffic data characterizes amount of service requests from front-end servers to a server group of one or more back-end servers that corresponds to a geographical tier in a server group hierarchy. The engine can receive metric measurements in a performance metric dimension for the server group and a performance threshold corresponding to the performance metric dimension and the geographical tier. The engine can estimate a linear derivative between variable traffic data and variable performance metric in the performance metric dimension based on collected sample points respectively representing the traffic data and the metric measurement. The engine can then compute, based on the linear derivative and the performance threshold, a threshold traffic capacity of the server group. The engine can then generate a routing table based on the threshold traffic capacity.