H04L47/822

Policy Determining Method and Apparatus, and System
20230040486 · 2023-02-09 ·

Embodiments of this application provide a policy determining method and apparatus, and a system, and relate to the field of communication technologies, to formulate a first policy for a subarea more accurately. The solution includes: A first network element sends, to a data analytics network element, a first request for requesting network performance information. The first request includes information about a first area and information about a first time period. The first network element receives first network performance information in a second area from the data analytics network element. The first network element determines a first policy based on the first network performance information. In this solution, a subarea may be used as a granularity, and the first policy may be accurately determined based on first network performance information in the subarea.

Resource allocation method, apparatus, and system, and storage medium
11558784 · 2023-01-17 · ·

A resource allocation method includes: obtaining, by a first network device, target resource reservation information based on a plurality of transmitted packets, where all of the packets carry a same virtual network identifier, and the virtual network identifier is used to indicate that the packets are transmitted through a same virtual network; and allocating a resource to the virtual network based on the target resource reservation information.

BANDWIDTH MANAGEMENT FOR RESOURCE RESERVATION PROTOCOL LSPS AND NON-RESOURCE RESERVATION PROTOCOL LSPS

In general, techniques described are for bandwidth sharing between resource reservation protocol label switched paths (LSPs) and non-resource reservation protocol LSPs. For example, in networks where resource reservation protocol LSPs and non-resource reservation protocol LSPs co-exist within the same domain, resource reservation protocol LSPs and non-resource reservation protocol LSPs may share link bandwidth. However, when non-resource reservation protocol LSPs are provisioned, resource reservation protocol path computation elements computing resource reservation protocol paths may not account for non-resource reservation protocol LSP bandwidth utilization. The techniques described herein provide a mechanism for automatically updating traffic engineering database (TED) information about resource reservation protocol LSPs in a way that accounts for non-resource reservation protocol LSP traffic flow statistics, such as bandwidth utilization. Path computation elements may thus rely on an accurate TED for LSP path computation.

Dynamic endpoint resources discovery in Kubernetes clusters via stable URI locator for workflow services
11711315 · 2023-07-25 · ·

A method of performing resource discovery includes receiving, by a processing device, a resource identifier describing a resource of a computing cluster to be accessed by a workflow application. The method also includes sending the resource identifier to a container orchestration API to determine whether an endpoint exists for the resource. The method also includes, in response to an indication from the container orchestration API that the endpoint exists, receiving, from the container orchestration API, endpoint details used to access the resource, identifying an endpoint address based on the endpoint details, and binding the endpoint address to the resource in a runtime version of the workflow application to enable the workflow application to access the resource.

SHAPING OUTGOING TRAFFIC OF NETWORK PACKETS IN A NETWORK MANAGEMENT SYSTEM
20180013659 · 2018-01-11 ·

A network management system can include multiple network interfaces. For example, the network management system can include a first network interface that can receive a stream of network packets associated with users. The network management system can include a second network interface for transmitting the received stream of network packets. The network management system can shape the stream of network packets before transmission. The network management system can assign the network packets into classes. The classes may have a configured hierarchical relationship. The classes may also have an operational hierarchy based on bandwidth usage during operation. The network management system can shape the stream of network packets based on operational hierarchy of classes and configured hierarchical relationship.

CROWD-SOURCED CLOUD COMPUTING RESOURCE VALIDATION

Resource provider specifications, characterizing computing resources of computing resource providers, are received. The reachability of each IP address included in the received specification is determined. An agent is deployed that is operable to determine the value of each of a set of metrics in the environment of the host at which the agent is deployed. The agent determines the value of each metric of the set of metrics in the environment of the relevant host, and communicates the determined values to one or more computing devices that validate whether the resources characterized by the communicated values are sufficient to provide the performance characterized by the received specification and that each ISP router complies with a predetermined policy. For each computing resource provider validated and determined to comprise an ISP router compliant with policy, the specified computing resources are added to a pool of resources for cloud computing.

TECHNIQUES AND ARCHITECTURES FOR EFFICIENT ALLOCATION OF UNDER-UTILIZED RESOURCES
20230006891 · 2023-01-05 · ·

In a computing environment, a set of executing processes each having associated resources are provided. Aggregate resources for the computing environment include multiple different types of resources. A utilization level for each of the resources within the computing environment is evaluated to determine an unconsumed capacity for each of the resources below a utilization threshold. The utilization threshold is resource-dependent. An indication of at least a portion of unconsumed capacity for each of the resources below the utilization threshold is gathered. The unconsumed portion for each of the resources below the utilization threshold is exposed for consumption by other executing processes.

Predictive network capacity scaling based on customer interest

In one example, the present disclosure describes a device, computer-readable medium, and method for scaling network capacity predictively, based on customer interest. For instance, in one example, a method includes predicting an interest of a first customer in data content that will be available for consumption over a data network at a time in the future, wherein the predicting is based on customer data including at least a search pattern associated with the first customer, flagging the data content when the predicting indicates at least a threshold degree of likelihood that the first customer will be interested in the data content, and scaling an allocation of resources of the data network to the first customer, based on the flagging.

METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR REQUEST CONTROLLING
20230231816 · 2023-07-20 ·

Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for request controlling. The method includes determining, in response to receiving a request for computing resources, a first control window including a plurality of control time slots, the request being received in a receive time slot of the plurality of control time slots. The method further includes determining a quantity of available computing resources within the first control window according to a position of the receive time slot in the plurality of control time slots. The method further includes processing the request within the first control window if the quantity of available computing resources does not exceed a threshold. The method can improve the capability of controlling requests for computing resources, and reduce congestion caused by a large number of requests exceeding the load of computing resources.

Agile transport for background traffic in cellular networks

Concepts and technologies directed to agile transport for background traffic in cellular networks are disclosed herein. In various aspects, a system can include a processor and memory storing instructions that, upon execution, cause performance of operations. The operations can include determining a capacity of a communication path that communicatively couples a user equipment to a radio access network cell site. The operations can include identifying, from the radio access network cell site, a queue that is constructed for the user equipment. The operations can include assembling a plurality of probe burst packet sets from a background traffic flow. The operations can include probing the communication path for spare capacity using the plurality of probe burst packet sets and delivering the background traffic flow to the user equipment using the spare capacity while the communication path is not busy.