Abstract:
A method of providing a service, to a plurality of terminals on a communication network, through a server on the communication network includes the following steps: 1) coupling a correlator to the network which links a unique name for the server to multiple network addresses; 2) providing a set of multiple computers on the network, each of which performs the service and is assigned a different one of the multiple network addresses; and, 3) incorporating a network address selector on the network which directs any one of the terminals to a single one of the computers, when an operator of that one terminal generates a request for the service which includes the unique name of the server. Due to this method, the server has a virtual single network address which means that from the point of view of an operator of a terminal, the service is being provided by a single computer on the network that has a single network address that corresponds to the server's unique name. But in reality, the requested service is being provided to the terminal by different computers at different times, depending upon which computer is selected by the network address selector.
Abstract:
Methods for operating a device and for managing bootstrapping of devices are disclosed. The method (100) for operating a device comprises computing (102) a derivative of a secret shared between the device and a server entity of a network, generating (104) a temporary bootstrap URI by combining at least a part of the computed derivative with a static bootstrap URI for the network, and sending (106) a bootstrap request to the temporary bootstrap URI. The method for managing bootstrapping of devices comprises generating temporary bootstrap URIs corresponding to devices operable to connect to a network, and updating a network DNS registry to map the generated temporary bootstrap URIs to the IP address of at least one of a bootstrap server instance reachable via the network and/or a bootstrap load balancer. Also disclosed are a device, a bootstrap load balancer, a bootstrap server, and a computer program.
Abstract:
A technique to stop lateral movement of ransomware between endpoints in a VLAN is disclosed. A security appliance is set as the default gateway for intra-LAN communication by overwriting the DHCP responses. A high availability cluster of the gateways is utilized to distribute traffic and implement load balancing amongst the gateways.
Abstract:
A method and system for implementing domain name services (DNS) is described. In one aspect a query from a user device for access to a particular resource record may be received and forwarded to an authoritative DNS device. A reply to the query may be received from the authoritative DNS device. Information of the reply also may be distributed to other DNS devices.
Abstract:
One embodiment of the present invention provides a system that can manage access to a service from a cluster of computing nodes. An instance of the system can operate on a respective computing node. During operation, the system instance can identify an Internet Protocol (IP) address, which provides access to the service from the cluster of computing nodes to a client device at a client site. The system instance can select the computing node for hosting the IP address in the cluster of computing nodes based on a set of selection criteria. The selection is performed independently at the computing node. The system instance can then assign the IP address to the computing node. The assignment allows a request for the service to be directed to the computing node. Subsequently, the system instance can facilitate the service from the cluster of computing nodes based on the request.
Abstract:
The present disclosure relates to managing services by a managed service provider (MSP) in a cloud based infrastructure. A control plane of the MSP is established in a first tenancy, and a first access plane of the MSP is established in a second tenancy of a cloud environment. The control plane is configured to manage a plurality of services offered by the MSP to a first host machine included in the second tenancy. A first request is transmitted from the control plane to the first access plane, where the first request is forwarded by the first access plane to the first host machine, and corresponds to a service utilized by the first host machine and managed by the control plane of the MSP. In response to the first request being validated, a first state of the first host machine is modified in the second tenancy based on the first request.
Abstract:
Systems, apparatuses, and methods are described for adjusting capacity in a networking environment. A networking system comprising clients, servers, load balancers, and/or other devices may expand and contract network capacity as needed. When expanding network capacity, load balancers may instruct client devices to connect to servers that are part of the expanded network. When network capacity is reduced, a server and/or a load balancer my instruct client devices to close a connection with a first server and establish a connection with a second server. Client devices may seamlessly begin using the connection with a second server without having to wait for a connection timeout with the first server.
Abstract:
The invention is based, in part, on a system and method designed to be able to easily and automatically scale up to millions of cameras and users. To do this, this discourse teaches use of modern cloud computing technology, including automated service provisioning, automated virtual machine migration services, RESTful API, and various firewall traversing methods to facilitate the scaling process. Moreover, the system and method described herein teaches scalable cloud solutions providing for higher though-put camera provisioning and event recognition. The network may segregate the retrieval server from the storage server, and by doing so, minimizing the load on any one server and improving network efficiency and scalability
Abstract:
Methods for operating a device and for managing bootstrapping of devices are disclosed. The method (100) for operating a device comprises computing (102) a derivative of a secret shared between the device and a server entity of a network, generating (104) a temporary bootstrap URI by combining at least a part of the computed derivative with a static bootstrap URI for the network, and sending (106) a bootstrap request to the temporary bootstrap URI. The method for managing bootstrapping of devices comprises generating temporary bootstrap URIs corresponding to devices operable to connect to a network, and updating a network DNS registry to map the generated temporary bootstrap URIs to the IP address of at least one of a bootstrap server instance reachable via the network and/or a bootstrap load balancer. Also disclosed are a device, a bootstrap load balancer, a bootstrap server, and a computer program.
Abstract:
An approach for avoiding overloads of network adapters. The approach receives one or more requests from one or more virtual machines, wherein the one or more requests are directed to one or more network adapters. The approach determines whether a first network adapter of the one or more network adapters is saturated. Responsive to a determination that the first network adapter is saturated, the approach sends a first busy event to a first virtual machine of the one or more virtual machines.