Patent classifications
H04L41/046
METHOD AND APPARATUS FOR PROVIDING PLURALITY OF VIRTUAL NETWORKS FOR SINGLE APPLICATION IN MOBILE COMMUNICATION NETWORK
The present disclosure relates to a communication method and system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data rates beyond a 4.sup.th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. The support of a virtual network group according to an embodiment of the present disclosure enables efficient communication of a terminal by using an external network, configured via an existing short-range communication network, or a private network between terminals based on 5G. Accordingly, a network operator or an entity in charge thereof enables terminals to interwork with equipment through communication via a virtual private network without changes in an existing communication method or a network structure, or without adding additional equipment.
System and method of using a global discovery service to enable routing of packets from a source container to a destination container
Systems, methods, and computer-readable storage media are provided to populate databases with routing data for containers to eliminate the need for continuously accessing a global discovery service. An example method includes initiating, from a source container operating on a first machine in a first rack, a communication with a destination container operating on a second machine on a second rack, wherein a local database on the first machine does not know an address of the destination container. The method includes accessing a global discovery service to provide the address of the destination container, populating the local database on the first machine with the address of the destination container and routing a packet from the source container to the destination container according to the address of the destination container.
System and method for dynamic device discovery and address assignment
A pool or spa system includes networked pool or spa devices that can be dynamically configured with network address by a controller. The controller can transmit a device discovery request on a network and can receive a discovery response from pool or spa devices that require a network address. The system determines and assigns the network addresses for the pool or spa devices based on unique device identifiers associated with the responding pool or spa devices. The network addresses assigned to the pool or spa device are transmitted to the pool or spa device to be used by the pool or spa devices to communicate with the controller over the network. The system can be used to discover and assign addresses to various types of pool or spa devices, such as pumps, underwater lights, chlorinators, water feature controllers, remote controllers, and/or other types of devices.
System and method for dynamic device discovery and address assignment
A pool or spa system includes networked pool or spa devices that can be dynamically configured with network address by a controller. The controller can transmit a device discovery request on a network and can receive a discovery response from pool or spa devices that require a network address. The system determines and assigns the network addresses for the pool or spa devices based on unique device identifiers associated with the responding pool or spa devices. The network addresses assigned to the pool or spa device are transmitted to the pool or spa device to be used by the pool or spa devices to communicate with the controller over the network. The system can be used to discover and assign addresses to various types of pool or spa devices, such as pumps, underwater lights, chlorinators, water feature controllers, remote controllers, and/or other types of devices.
Tracking image senders on client devices
Methods and systems for tracking image senders using client devices are described herein. A computing system may receive an image containing a first watermark vector corresponding to a user account of an image sender. The computing system may convert the image to a frequency domain image that contains the first watermark vector. From the frequency domain image, the computing system may identify the first watermark vector. The computing system may compare the first watermark vector to each of a plurality of stored watermark vectors, each corresponding to a known user account, to determine a probability of a match. The computing system may determine the user account of the sender of the image by determining which of the plurality of stored watermark vectors has a highest probability of a match, and may send, to a workplace administrator platform, an indication of the user account.
MEASURING PERFORMANCE OF VIRTUAL DESKTOP EVENT REDIRECTION
The disclosure provides an approach for measuring performance between a virtualized desktop infrastructure (VDI) client running on a client device and a remote computing device. Embodiments include generating, by a performance client on the client device, an event and storing a time associated with generating the event. Embodiments include transmitting, by the VDI client to the remote computing device, a message based on the OS event. Embodiments include determining, by a performance agent on the remote computing device, a time associated with receiving the message at the remote computing device and causing an indication of the time to be displayed in a virtual desktop screen. Embodiments include extracting, by the performance client, from the virtual desktop screen, the time, and determining a performance metric based on the extracted time and the time associated with receiving the message at the remote computing device.
Collect and forward
Apparatus and methods are disclosed for processing messages from agents of a network environment including the use of collectors. Collectors can use configurable pipelines to improve processing of messages received from the agents. In one example of the disclosed technology, a number of networked agents are configured to gather data describing operational aspects of an agent's computing host. A collector is configured to receive reports from the agent and send the gathered data to one or more destination agent data consumers designated by augmentation information in the reports. In some examples, the collector transforms data using one or more stage selector rules.
Detecting outages in a cloud environment
The present disclosure relates to computer-implemented methods, software, and systems for detecting outages in a cloud environment. Internal web agents installed at corresponding network segments of a first cloud platform and external web agents installed at an external second cloud platform are configured to perform network calls between themselves and the other web agents. Data from the internal web agents is automatically collected to generate structured data defining network connectivity status corresponding to the network segments of the first cloud platform based on the performed network calls between the internal and external web agents. In response to evaluating the structured data, a health status of network connectivity of the first cloud platform is determined. The health status can be provided to platform services provided by the first cloud platform and/or applications running on the first cloud platform to support managing of lifecycles of entities running on the first cloud platform.
Dynamic service chaining and late binding
A visibility platform can be used to monitor traffic traversing private cloud infrastructures and/or public cloud infrastructures. In some instances, the traffic is provided to a set of network services that are accessible to the visibility platform. These network services can be provisioned in a serial or parallel fashion. Network service chaining can be used to ensure that traffic streams skip unnecessary network services and receive only those network services that are needed. For example, an email service chain can include virus, spam, and phishing detection, while a video streaming service chain can include traffic shaping policies to satisfy quality of service (QoS) guarantees. When the visibility platform is represented as a graph that makes use of action sets, network service chains can be readily created or destroyed on demand.
Dynamic service chaining and late binding
A visibility platform can be used to monitor traffic traversing private cloud infrastructures and/or public cloud infrastructures. In some instances, the traffic is provided to a set of network services that are accessible to the visibility platform. These network services can be provisioned in a serial or parallel fashion. Network service chaining can be used to ensure that traffic streams skip unnecessary network services and receive only those network services that are needed. For example, an email service chain can include virus, spam, and phishing detection, while a video streaming service chain can include traffic shaping policies to satisfy quality of service (QoS) guarantees. When the visibility platform is represented as a graph that makes use of action sets, network service chains can be readily created or destroyed on demand.