H04L12/859

SYSTEMS AND METHODS FOR ENABLING A HIGHLY AVAILABLE MANAGED FAILOVER SERVICE
20210157694 · 2021-05-27 ·

a computing system that receives and stores configuration information for the application in a data store. The configuration information comprises (1) identifiers for a plurality of cells of the application that include at least a primary cell and a secondary cell, (2) a defined state for each of the plurality of cells, (3) one or more dependencies for the application, and (4) a failover workflow defining actions to take in a failover event. The computing system receives an indication, from a customer, of a change in state of the primary cell or a request to initiate the failover event. The computing system updates, in the data store, the states for corresponding cells of the plurality of cells based on the failover workflow and updates, in the data store, the one or more dependencies for the application based on the failover workflow.

Template-based session control in proxy solutions

A computer-implemented method includes receiving, by a reverse proxy device, a session control template, and a client request directed to a service provider regarding an application. The method includes determining, by the reverse proxy device, whether the client request should be allowed or blocked based on the received session control template. If the reverse proxy device determines that the client request should be allowed, the client request is forwarded from the reverse proxy device to the service provider. If the reverse proxy device determines that the client request should be blocked, the client request is blocked from proceeding to the service provider.

EDGE-NODE CONTROLLED RESOURCE DISTRIBUTION

This application describes apparatus and methods for using edge-computing to control resource distribution among access channels, such as a retail banking center. Edge-nodes may be configured to move a product display in response to detected or expected customer traffic flow in or near a retail location. Edge-nodes may be configured to redirect resources provided by a cloud computing environment to or away from the retail location. Based on customer traffic flow, edge-nodes may direct customers/resources to a retail location and ensure the retail location provides a predetermined quality of service.

METHOD AND SYSTEM FOR CONTENT DISTRIBUTION AMONG MEC NETWORKS

A method, a device, and a non-transitory storage medium are described in which a edge content distribution service is provided. The edge content distribution service may include the distribution of static content among multi-access edge computing networks. The edge content distribution service may include tiered overlay networks that are correlated to performance metrics associated with application services, static contents of the application services, and/or the acquisition and delivery of the static contents. The edge content distribution service also consider available network resources at the multi-access edge computer networks and the overlay networks of the tiered architecture.

Control of communication with external application

An apparatus including at least one processing circuitry, and at least one memory for storing instructions to be executed by the processing circuitry, wherein the at least one memory and the instructions are configured to, with the at least one processing circuitry, cause the apparatus at least: to determine an abnormal operation of an external application with which at least one communication element has established a communication connection; to decide on a change of an uplink traffic to the external application; and to selectively control a communication of the at least one communication element to the external application by providing control information for the at least one communication element, the control information reflecting the decision to change the uplink traffic to the external application.

Method and user equipment for blocking network access by ACDC

A disclosure of the present specification provides a method for blocking network access. The method may comprise the steps of: receiving application specific congestion control for data communication (ACDC) blocking information; driving a blocking timer when it is determined by an ACDC blocking check that a network access attempt by a first application being executed is blocked; determining the category of a second application being executed according to a network access attempt by the second application; performing an ACDC blocking check on the basis of the determined category of the second application and the received ACDC blocking information when the determined category of the second application has a higher priority than the category of the first application; and stopping the blocking timer when the network access attempt by the second application should be permitted according to the ACDC blocking check.

INTEGRATION APPLICATION UTILIZING A COMMUNICATIONS PROTOCOL

A computer system configured to facilitate communications over a plurality of communication platforms includes a chat monitor configured to monitor communications over a plurality of communication platforms; a parser coupled to the chat monitor and configured to detect whether a communication entered into a communication client corresponds to a communication protocol, the communication protocol including a protocol identifier and a plurality of primary protocol elements including a first user identifier and an instrument identifier; a protocol validator coupled to the parser and configured to validate communications corresponding to the communication protocol; and a database coupled to the protocol validator for storing validated communications. Each communication platform may be associated with a plurality of communication clients, and each communication platform may be configured to transmit communications between communication clients associated with the communication platform.

TECHNOLOGIES FOR CONTEXT-AWARE DYNAMIC BANDWIDTH ALLOCATION

Technologies for context-aware dynamic bandwidth allocation include a network compute device configured to collect context inputs from a plurality of compute devices communicatively coupled to the network compute device. The network compute device is further configured to identify a context of each compute device based on the collected context inputs and determine a bandwidth priority for each compute device based on the identified context. Additionally, the network compute device is configure to determine an amount of bandwidth from a total available bandwidth to allocate to the compute device based on the determined bandwidth priority and update a moderated bandwidth allocation policy to reflect the determined amount of bandwidth allocated to the compute device. Other embodiments are described herein.

Apparatus and method for controlling data transmission in communication system

The present disclosure relates to a pre-5.sup.th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4.sup.th-Generation (4G) communication system such as Long Term Evolution (LTE). Disclosed is a method of operating a device in a communication system. The method includes: configuring a threshold parameter for data transmission/reception based on at least one of an application characteristic, a network utilization, and a network speed; and controlling data transmission/reception with a network based on the threshold parameter The threshold parameter is relevant to at least one of an amount of data, which can be received by the proxy device and an amount of data which can be transmitted by the proxy device.

Managing untyped network traffic flows
10997303 · 2021-05-04 · ·

An enterprise security system is improved by managing network flows based on an application type. When a network message having an unknown application type is received at a gateway, firewall, or other network device/service from an endpoint, the endpoint that originated the network message may be queried for identifying information for the source of the network message and the application type may be determined, or the endpoint may periodically communicate application type information to the network device in a heartbeat or other periodic communication or the like. The network message may be managed along with other network traffic according to the application type.