H04L12/917

EXPLICIT CONTROL OF AGGREGATION LINKS VIA IS-IS
20170295089 · 2017-10-12 ·

A process is implemented by a network device for enabling the provisioning of explicit trees in a network by reporting link aggregation group (LAG) configuration information to a path computation element (PCE). The network device implements a LAG module and an intermediate system-intermediate system (IS-IS) module that includes an IS-IS path control and reservation module (ISIS-PCR). The process includes reporting LAG configuration by the LAG module to the IS-IS module within the network device, sending a link state protocol data unit (PDU) (LSP) with the LAG configuration in a LAG sub type length value (TLV) by the ISIS-PCR, receiving, by the IS-IS module, an explicit tree that specifies at least one virtual local area network (VLAN) identifier (VID) to an aggregation link of the LAG assignment, and translating, by the ISIS-PCR module, the explicit tree into a LAG configuration, the LAG configuration specifying a conversation to aggregation link assignment.

Method and apparatus for delegating resources between devices
09787602 · 2017-10-10 · ·

A system performs operations including detecting a request to present a game application, receiving a resources identifier from a second communication device, determining from the resources identifier that the second communication device has one of a computing resource, a presentation resource, or both, selecting a configuration from a plurality of configurations according to an identity of the gaming application and the resources identifier, selecting according to the configuration at least one resource from one of the computing resource, the presentation resource, or both of the second communication device, and delegating processing by the first communication device of a portion of the gaming application according to the at least one resource of the second communication device.

Procedures, apparatuses, systems, and computer program products for adaptive tunnel bandwidth by using software defined networking
09787594 · 2017-10-10 · ·

A procedure for managing network traffic, and a system that operates in accordance with the procedure. Performance monitoring data is received from multiple network elements that define one or more paths along a network tunnel. The performance monitoring data includes data on network utilization. There is a detection of whether network utilization through the network tunnel exceeds an overflow threshold or an underflow threshold based on the performance monitoring data. A new path and new network elements are determined for the network tunnel, and instructions are transmitted to the network elements on the network to implement the new path.

Workload Behavior Modeling and Prediction for Data Center Adaptation

Examples may include techniques to a indicate behavior of a data center. A data center is monitored to collect operating information and one or more models to represent behavior of the data center are built based on the collected operating information. Predicted behavior of the data center to support a workload based on different operating scenarios using the one or more built models is indicated to facilitate resource allocation and scheduling for the workload supported by the data center.

Load adaptation architecture framework for orchestrating and managing services in a cloud computing system

According to one aspect of the concepts and technologies disclosed herein, a cloud computing system can include a load adaptation architecture framework that performs operations for orchestrating and managing one or more services that may operate within at least one of layers 4 through 7 of the Open Systems Interconnection (“OSI”) communication model. The cloud computing system also can include a virtual resource layer. The virtual resource layer can include a virtual network function that provides, at least in part, a service. The cloud computing system also can include a hardware resource layer. The hardware resource layer can include a hardware resource that is controlled by a virtualization layer. The virtualization layer can cause the virtual network function to be instantiated on the hardware resource so that the virtual network function can be used to support the service.

Optimization of resource utilization in a collection of devices

Technologies are described herein for optimizing resource utilization in a collection of devices having hierarchical network layers. Some example technologies may identify packets exchanged between processes executed on collections of server computers. The hierarchical network layers may couple the collections of server computers. The technologies may determine virtual machine groups based on the identified packets. Each of the virtual machine groups may identify one or more virtual machines configured on the collections of server computers to execute one or more processes. The virtual machine groups may be configured to increase data traffic in a lower layer in the hierarchical network layers and to decrease the data traffic in a higher layer in the hierarchical network layers. The technologies may relocate the virtual machines between the collections of server computers according to the virtual machine groups.

CONTEXT-AWARE TASK PROCESSING FOR MULTIPLE DEVICES
20170230304 · 2017-08-10 ·

The present disclosure relates to processing tasks offloaded from one or more user devices to a cloud service. An example method generally includes receiving a command to be processed by the cloud service. The cloud service generates a response based on the command and selects one or more user devices to receive at least part of the response. The cloud service selects the one or more user devices based, at least in part, on context information about the one or more user devices. The cloud service partitions the response into one or more portions corresponding to each of the one or more user devices based on the selecting and transmits the one or more portions to the corresponding one or more selected user devices.

Method and apparatus for network resource virtual partitioning
09727386 · 2017-08-08 · ·

A method and apparatus are disclosed for network resource virtual partitioning. An embodiment method includes mapping a plurality of hardware functions at a plurality of physical network interface devices into a plurality of virtual partitions (VPs) implemented using software, wherein the VPs are configured to manage and operate independent from one another the corresponding hardware functions at the physical network interface devises. An embodiment apparatus includes a processor configured to aggregate a plurality of hardware functions at a plurality of physical network interface devices into a plurality of virtual partition aggregations (VPAs), wherein the VPAs are configured to manage and operate independent from one another a plurality of corresponding subsets of the hardware functions to serve one or more clients.

Multi-protocol label switching rings
09729455 · 2017-08-08 · ·

Techniques are described for specifying and constructing multi-protocol label switching (MPLS) rings. Routers may signal membership within MPLS rings and automatically establish ring-based label switch paths (LSPs) as components of the MPLS rings for packet transport within ring networks. In one example, a router includes a processor configured to establish an MPLS ring having a plurality of ring LSPs. Each of the ring LSPs is configured to transport MPLS packets around the ring network to a different one of the routers operating as an egress router for the respective ring LSP. Moreover, each of the ring LSPs comprises a bidirectional, multipoint-to-point (MP2P) LSP for which any of the routers can operate as an ingress to source packet traffic into the ring LSP for transport to the respective egress router for the ring LSP. Separate protection paths, bypass LSPs, detours or loop-free alternatives need not be signaled.

NETWORK CONTROLLER

A network controller is configured to perform, to a new slice request, resource allocation from a resource of unallocated resource information managed by a resource information management unit, and to reallocate the resource to an existing slice request so that an unallocated resource increases based on unallocated resource information managed by the resource information management unit.