FAILURE REDUCTION SYSTEM FOR COMMUNICATION NETWORK

    公开(公告)号:US20220060391A1

    公开(公告)日:2022-02-24

    申请号:US17517601

    申请日:2021-11-02

    Abstract: In one embodiment, a method comprises determining whether an automation recommendation for a network is to be forwarded to a management system of the network, wherein the automation recommendation specifies an action to take with respect to a plurality of platforms of the network and is received from a recommendation system utilizing artificial intelligence to generate the automation recommendation; responsive to a determination to forward the automation recommendation, assessing an impact of the automation recommendation; and performing an action with respect to the automation recommendation based on the impact.

    PROCESSOR UNIT RESOURCE EXHAUSTION DETECTION AND REMEDIATION

    公开(公告)号:US20210182194A1

    公开(公告)日:2021-06-17

    申请号:US17185648

    申请日:2021-02-25

    Abstract: A performance monitor provides cache miss stall and memory bandwidth usage metric samples to a resource exhaustion detector. The detector can detect the presence of last-level cache and memory bandwidth exhaustion conditions based on the metric samples. If cache miss stalls and memory bandwidth usage are both trending up, the detector reports a memory bandwidth exhaustion condition to a resource controller. If cache miss stalls are trending up and memory bandwidth usage is trending down, the detector reports a last-level cache exhaustion condition to the resource controller. The resource controller can allocate additional last-level cache or memory bandwidth to the processor unit to remediate the resource exhaustion condition. If bandwidth-related metric samples indicate that a processor unit may be overloaded due to receiving high bandwidth traffic, the resource controller can take a traffic rebalancing remedial action.

    Technologies for scalable network packet processing with lock-free rings

    公开(公告)号:US10999209B2

    公开(公告)日:2021-05-04

    申请号:US15635581

    申请日:2017-06-28

    Abstract: Technologies for network packet processing include a computing device that receives incoming network packets. The computing device adds the incoming network packets to an input lockless shared ring, and then classifies the network packets. After classification, the computing device adds the network packets to multiple lockless shared traffic class rings, with each ring associated with a traffic class and output port. The computing device may allocate bandwidth between network packets active during a scheduling quantum in the traffic class rings associated with an output port, schedule the network packets in the traffic class rings for transmission, and then transmit the network packets in response to scheduling. The computing device may perform traffic class separation in parallel with bandwidth allocation and traffic scheduling. In some embodiments, the computing device may perform bandwidth allocation and/or traffic scheduling on each traffic class ring in parallel. Other embodiments are described and claimed.

    Resource monitoring
    69.
    发明授权

    公开(公告)号:US10979328B2

    公开(公告)日:2021-04-13

    申请号:US15475864

    申请日:2017-03-31

    Abstract: Particular embodiments described herein provide for a network element that can be configured to receive a link monitoring message, determine one or more resources associated with the link monitoring message, determine a status of each of the one or more resources, and send a response that provides an indication of the status of each of the one or more resources. In an example, the link monitoring is part of a bidirectional forwarding detection packet.

    Technologies for cache side channel attack detection and mitigation

    公开(公告)号:US10860714B2

    公开(公告)日:2020-12-08

    申请号:US16022976

    申请日:2018-06-29

    Abstract: Technologies for cache side channel attack detection and mitigation include an analytics server and one or more monitored computing devices. The analytics server polls each computing device for analytics counter data. The computing device generates the analytics counter data using a resource manager of a processor of the computing device. The analytics counter data may include last-level cache data or memory bandwidth data. The analytics server identifies suspicious core activity based on the analytics counter data and, if identified, deploys a detection process to the computing device. The computing device executes the detection process to identify suspicious application activity. If identified, the computing device may perform one or more corrective actions. Corrective actions include limiting resource usage by a suspicious process using the resource manager of the processor. The resource manager may limit cache occupancy or memory bandwidth used by the suspicious process. Other embodiments are described and claimed.

Patent Agency Ranking