Patent classifications
H04L12/733
Systems and methods for selecting a router to connect a bridge in the network on chip (NoC)
The present disclosure is directed to systems and methods for connecting hosts to any router by the use of bridges. Example implementations described herein are directed to determining connections between routers and hosts based on the topology of the NoC and cost functions. Unused routers may also be removed from the NoC configuration and unused directional host ports of routers may be utilized to connect hosts together depending on a cost function and the desired implementation.
PROVISIONING OF CONTAINERS FOR VIRTUALIZED APPLICATIONS
In a general aspect, a computer-implemented method can include receiving a request to provision a plurality of containers of an application across a plurality of data center hosts and iteratively placing the plurality of containers on the plurality of data center hosts. The containers can be selected for placement based on one of a locality constraint and an association with previously-placed containers. Placement of a selected container can be based on, at least, compute requirements of the selected container, network requirements of the selected container, configuration of the plurality of data center hosts, and performance metrics for the plurality of data center hosts.
CUSTOMIZATION OF CNAM INFORMATION FOR CALLS PLACED TO MOBILE DEVICES
One example method of operation may include identifying a call from a calling device destined for a mobile device, responsive to identifying a calling device number assigned to the calling device, accessing a call content application programming interface (API), operated by a content delivery device, configured to deliver to the mobile device a first caller identification name (CNAM) or a second CNAM, assigned to the calling device number, determining a context assigned to a mobile device number assigned to the mobile device, selecting one of the first CNAM and the second CNAM based on the context, and assigning the selected CNAM to the call.
Border gateway protocol (BGP) security measures along autonomous system (AS) paths
Systems, methods, and devices of the various embodiments disclosed herein may provide Border Gateway Protocol (BGP) security measures along autonomous system (AS) paths. Various embodiments may provide transparency as to the local security measures implemented along an AS path. Various embodiments may enable routing along secure paths. Various embodiments may enable the selection of AS paths based on a comparison of the security implemented along the AS paths. Various embodiments may reduce the impact of BGP attacks.
Parallel computer system, method of controlling a parallel computer system, and a non-temporary computer-readable medium that stores a program
A parallel computer system includes: direct links that forms a direct connection between a sending node and a receiving node, one-hop links that forms a connection between a sending node and a receiving node by way of a return node that is other than the sending node and the receiving node, and a communication control unit that, when transferring data from a sending node to a receiving node, selects the link that connects the sending node and the receiving node from among a link that uses only a direct link, a link that uses only a one-hop link, and a link that forms a connection combines and uses the direct link and the one-hop link.
METHOD FOR UPDATING ROUTE IN NETWORK, NETWORK DEVICE, AND SYSTEM
This application provides a method for updating a route in a network. The first network device sends a first LSA packet to a third network device, so that the third network device generates a first route whose destination address is a second IP address, where a next-hop IP address of the first route is the IP address of the first network device, and the second IP address belongs to the IP network segment corresponding to the first IP address which is an IP address of the first network device. The first network device sends a second LSA packet to the third network device when determining that switching needs to be performed on a next hop of a route in the third network device, whose destination address belongs to the IP network segment, and whose next-hop IP address is the first IP address.
Delay-Based Micro-Loop Prevention in IGP Routing
To determine whether to a delay a routing update, a router generates graphs of the network topology before and after the failure of a link or node and compares the graphs to identify changes in the network topology. Based on an analysis of the changes, the router determines whether to implement, continue and/or abort a preconfigured delay for making routing updates.
Efficient Method for Computing Backup Routes
A method implemented by a source router reduces the number of SPF computations needed to compute TI-LFA backup paths. Rather than naively perform a backup path computation for all destinations, the source router identifies those destinations affected by that link or node failure and performs backup path computations only for the affected destinations. For the remaining destinations (i.e., those for which a backup path is required), the backup path computations are performed in a breath-first order relative to a subtree rooted at the node incident to the failed link (in the case of a link failure) or at the protected node (in the case of a node failure). The breath-first order further reduces the number of computations required by taking advantage of earlier backup path computations.
CUSTOMIZATION OF CNAM INFORMATION FOR CALLS PLACED TO MOBILE DEVICES
One example method of operation may include identifying a call from a calling device destined for a mobile device, identifying a calling device number associated with the calling device and a mobile device number associated with the mobile device, determining whether a stored calling relationship exists between the calling device number and the mobile device number, and appending one of a plurality of caller identification names (CNAM) to the call based on the determination as to whether there is a stored calling relationship.
PACKET SENDING METHOD AND DEVICE
A packet sending method and device. The first node sets a next-hop of the routing information to a next-hop through which the first node reaches the first route source. The destination address of the routing information is the address prefix. When the second route source is superior to the first route source, the first node switches the next-hop of the routing information to a next-hop through which the first node reaches the second route source. Then, the first node adds, to a target packet, path information of a forwarding path from the first node to the second route source according to the switching operation, where a destination address of the target packet matches the address prefix. Finally, the first node forwards the target packet to the second route source through the forwarding path.