Abstract:
A method and system for implementing domain name services (DNS) is described. In one aspect a query from a user device for access to a particular resource record may be received and forwarded to an authoritative DNS device. A reply to the query may be received from the authoritative DNS device. Information of the reply also may be distributed to other DNS devices.
Abstract:
A system establishes virtual DNS servers that are supported by a DNS server. Target IP addresses are assigned for the virtual DNS servers. Network capable devices are uniquely assigned to the virtual DNS servers for domain name resolution. Each network capable device accesses the communication network through a corresponding network device associated with a corresponding source IP address. A client's service plan is assigned to a first network capable device used by the client. The service plan is implemented through a DNS request under a session established between the first network capable device and its assigned first virtual DNS server. The session is uniquely identified by a first source IP address of a first network device used by the first network capable device to access the communication network and a first target IP address of the first virtual DNS server.
Abstract:
Some embodiments provide systems and methods for determining a server of a distributed hosting system to optimally distribute content to an end user. The method includes identifying an IP address of the end user. Based on the IP address, a set of servers send packets to the end user to derive performance metrics. The performance metrics are used to determine a server from the set of servers that optimally distributes content to the end user. The method modifies a configuration for resolving end user requests such that the optimal server is identified to the end user when the end user requests content from the hosting system. Some embodiments determine the optimal server by providing downloadable content that is embedded with a monitoring tool. The monitoring tool causes the end user to derive performance metrics for the hosting system when downloading a particular object from a set of servers.
Abstract:
A method for creating a course for dynamic provisioning includes receiving, by a creation engine, from a second computing device associated with a user, a request to create a course. The creation engine receives, from the second computing device, an identification of a type of computing resource for use during the course. A service provider computing device is selected from a plurality of service provider computing devices based upon an ability to provide access to the identified type of computing resource. The service provider computing device is instructed to provision a computing resource of the identified type. The second computing device is directed to connect to the provisioned computing resource. The method includes receiving, from the second computing device, an indication that the user configured the provisioned computing resource for use during the course. A state management engine is directed to save a state of the provisioned computing resource.
Abstract:
A network architecture includes a perimeter network connected between an internal network and an external network. The perimeter network includes one or more external edge nodes that are connected to the external network and a plurality of proxy servers that are each connected to one or more of the external edge nodes. One or more internal edge nodes are connected between the plurality of proxy servers and the internal network. The proxy servers are operable to establish a first secure connection between a destination through the external network and a second secure connection to a destination in the internal network. Each of the plurality of proxy servers provide a substantially identical identification for authentication when establishing the first and second secure connections.
Abstract:
To provision computer resources on a computing network, for instance a cloud network, an associated resource request parameter of a received resource request is determined. A system attribute is calculated based upon the resource request parameter. Based upon the calculated system attribute, a computing resources repository is queried to retrieve a computing resource. Upon querying, a persisted computing resource with a sufficient capacity to execute a client system process is retrieved. If the computing resources repository does not include a persisted computing resource, an expandable computing resource is retrieved. If the computing resources repository does not include an expandable computing resource, a new computing resource is rendered to execute the client system process. The retrieved computing resource is assigned to the received resource request, and the assigned computing resource is provisioned to execute the client system process.
Abstract:
Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving a first Diameter message at the DRA; evaluating a first rule, including accessing data from a generic binding context object including: locating a record associated with a key specified by the first rule, and retrieving the data from the record; and transmitting a message based on the evaluation of the first rule. Various embodiments additionally relate to receiving a second Diameter message at the DRA; and evaluating a second rule, including accessing the generic binding context object, including storing the data in the record associated with the key.
Abstract:
A method of selectively allocating a plurality of deployment units among a plurality of clouds. The method can include identifying a first context of a first deployment unit of a workload and identifying a second context of a second deployment unit of the workload. Based on the first context, a first of the plurality of clouds that satisfies at least one requirement indicated by the first context can be identified and the first deployment unit can be automatically allocated to the first cloud. Based on the second context, a second of the plurality of clouds that satisfies at least one requirement indicated by the second context can be identified, wherein the first cloud does not satisfy the requirement indicated by the second context, and the second deployment unit can be automatically allocated to the second cloud.
Abstract:
Each service in a computer network may have a connection rate limit. The number of new connections per time period may be limited by using a series of rules. In a specific embodiment of the present invention, a counter is increased each time a server is selected to handle a connection request. For each service, connections coming in are tracked. Therefore, the source of connection-request packets need not be examined. Only the destination service is important. This saves significant time in the examination of the incoming requests. Each service may have its own set of rules to best handle the new traffic for its particular situation. For server load balancing, a reset may be sent to the source address of the new connection request. For transparent cache switching, the connection request may be forwarded to the Internet.
Abstract:
A method of redirecting content requests among content distribution network peers. In operation, a client sends a request for content to a content distribution network (CDN). When this CDN does not currently have the capacity to deliver the content, the CDN refers to one or more content distribution tables to see if the neighbour peers are able to provide this content. The content distribution table is populated at the time of distribution of the content. When the neighbour peer has this content, the request is redirected to the neighbour peer. In redirecting request, an address of the neighbour peer is appending to the previous address such that each peer receiving the request knows where the request came from and where it has been previously.