Abstract:
Resilient routing management approaches are provided based on primary/backup and failover/failback relationships in a clustered network environment, where each user and/or resource is assigned to a primary cluster and at least one backup cluster. A distributed handover mechanism enables global knowledge of primary/backup relationships between clusters and their assigned users or resources.
Abstract:
The present disclosure relates to balancing load amongst different capillary-cellular gateways (24) to indirectly account for load attributable to self-managed devices (27) that are not directly managed by a management node (28). Embodiments include a method implemented by a management node (28) that directly manages managed device(s) (26) in capillary network(s) (16). The method comprises determining, for each of the managed device(s) (26), a weight metric that describes a collective load attributable to not only the managed device (26) but also to any self-managed devices (27) that connect to the cellular network (15) via the managed device (26). The method also comprises balancing load amongst the capillary-cellular gateways (24) based on the weight metrics, by requesting that at least one managed device (26) move its entire collective load to a different capillary-cellular gateway (24) or reduce its weight metric by shedding load.
Abstract:
Secure communication between processes in cloud platform may be performed by receiving a request from a client application process hosted in an application virtual machine at a load balancer. A first secure communication channel is established between the client application process and the load balancer. The first secure communication channel is encrypted with the client certificate. The first secure communication channel is terminated at the load balancer. A service process in a service virtual machine is identified based on the request received from the client application process. A new request is sent to the service virtual machine to establish a second secure communication channel between the load balancer and the service virtual machine. The load balancer certificate signed by the internal certificate authority is validated at the service virtual machine. Upon successful validation of the load balancer certificate, the second secure communication channel is accepted at the service virtual machine.
Abstract:
Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving a first Diameter message at the DRA; evaluating a first rule, including accessing data from a generic binding context object including: locating a record associated with a key specified by the first rule, and retrieving the data from the record; and transmitting a message based on the evaluation of the first rule. Various embodiments additionally relate to receiving a second Diameter message at the DRA; and evaluating a second rule, including accessing the generic binding context object, including storing the data in the record associated with the key.
Abstract:
A new approach is proposed that contemplates systems and methods to support bulk authentication of an appliance associated with a user to all cloud-based services the appliance intends to access in one transaction instead of authenticating the appliance against each of the services individually. First, the appliance generates and transmits to an authentication service cluster an authentication request that includes its identification and authentication credentials in order to access to a plurality of services. Upon receiving the authentication request, the authentication service cluster authenticates the appliance for all of the services to be accessed based on the information in the authentication request. Once the appliance is authenticated, the authentication service cluster then retrieves entitlement information of the services to be accessed by the appliance, and identifies the service clusters/nodes that the appliance will connect to for the services with the fastest response time.
Abstract:
Various embodiments of the invention provide methods and systems for providing a distributed computing platform. Tasks for execution are received from a remote computer and a set of computation users are identified to execute the set of computation task segments. The tasks are distributed to the set of computation users a solution segment is received from each computation user in the set of computation users to generate a set of solution segments, which are combined into a solution.
Abstract:
According to one embodiment, a method comprises an operation of determining whether an ingress control message is locally terminated control traffic on a digital device prior to the ingress control message being forwarded to a hardware processor of the digital device for processing. A priority is assigned to the ingress control message based on information within the ingress control message, if the ingress control message is determined to be locally terminated control logic.
Abstract:
A method and apparatus for distributing content via a communication network is presented. In one or more embodiments, the present invention comprises apparatus for receiving content from a server system. In one or more embodiments, the apparatus comprises a central processing unit, a video controller, a communications interface, and a memory comprising computer readable instructions for causing said apparatus to perform a variety of functions. In one or more embodiments, the computer readable instructions comprise instructions for causing the apparatus, upon connection to a power source and a communications source, to initiate a communications session with the server system. In one or more embodiments, the computer readable instructions comprise instructions to cause the apparatus to prompt a user of said apparatus to create an account at the server system.
Abstract:
A mechanism controls global synchronization, or registration floods, that may result when a large number of endpoints in a Voice over Internet Protocol (VoIP) network such as an Internet Protocol Multimedia Subsystem (IMS) come online simultaneously after a catastrophic failure. The mechanism allows the Domain Name System (DNS) infrastructure to efficiently control the overload condition by registering user end points with backup border elements, and by staggering and by randomizing the time-to-live (TTL) parameter in registrations with backup border elements.
Abstract:
Lookup requests received by a domain name service (DNS) are processed based on the actual location of data associated with a requested content page rather than a domain mapping of IP addresses. A DNS server which receives a request initiates a query for the location of user data associated with the request based on an object handle contained in a domain name of the request. The location data is used to construct an IP address which is provided in response to the IP lookup request received by the DNS server. The DNS system may be used to provide IP addresses for a scaled web-based networking service, alternate versions of a service and a service implementing rolling upgrades.