EXCESS ACTIVE QUEUE MANAGEMENT (AQM): A SIMPLE AQM TO HANDLE SLOW-START

    公开(公告)号:US20240388541A1

    公开(公告)日:2024-11-21

    申请号:US18447753

    申请日:2023-08-10

    Abstract: A system maintains a queue for storing packets, which are enqueued at a tail of the queue and dequeued at a head of the queue. The system computes a queue utilization value, based on the packets stored in the queue. The system computes an excess amount value, based on the packets stored in the queue and previously tagged as excess packets. The system receives a first packet at the tail of the queue and determines whether a difference between the queue utilization value and the excess amount value exceeds a predetermined threshold. Responsive to determining that the difference exceeds the predetermined threshold, the system tags the first packet as an excess packet. Responsive to tagging the first packet as an excess packet, the system performs an operation associated with the first packet or a second packet at the head of the queue to reduce congestion.

    Machine learning-based approaches for service function chain selection

    公开(公告)号:US12133095B2

    公开(公告)日:2024-10-29

    申请号:US17503232

    申请日:2021-10-15

    Abstract: Systems, methods, and computer-readable media are described for employing a machine learning-based approach such as adaptive Bayesian optimization to learn over time the most optimized assignments of incoming network requests to service function chains (SFCs) created within network slices of a 5G network. An optimized SFC assignment may be an assignment that minimizes an unknown objective function for a given set of incoming network service requests. For example, an optimized SFC assignment may be one that minimizes request response time or one that maximizes throughput for one or more network service requests corresponding to one or more network service types. The optimized SFC for a network request of a given network service type may change over time based on the dynamic nature of network performance. The machine-learning based approaches described herein train a model to dynamically determine optimized SFC assignments based on the dynamically changing network conditions.

    NETWORK-AWARE RESOURCE ALLOCATION
    88.
    发明公开

    公开(公告)号:US20230275848A1

    公开(公告)日:2023-08-31

    申请号:US18311430

    申请日:2023-05-03

    Abstract: Systems and methods are provided for updating resource allocation in a distributed network. For example, the method may comprise allocating a plurality of resource containers in a distributed network in accordance with a first distributed resource configuration. Upon determining that a processing workload value exceeds a stabilization threshold of the distributed network, determining a resource efficiency value of the plurality of resource containers in the distributed network. When a resource efficiency value is greater than or equal to the threshold resource efficiency value, the method may generate a second distributed resource configuration that includes a resource upscaling process, or when the resource efficiency value is less than the threshold resource efficiency value, the method may generate the second distributed resource configuration that includes a resource outscaling process. The resource allocation may transmit the second to update the resource allocation.

    Detecting attacks on computing devices

    公开(公告)号:US11658986B2

    公开(公告)日:2023-05-23

    申请号:US17123342

    申请日:2020-12-16

    Abstract: An example system may comprise a first computing device comprising instructions executable by a hardware processor to: create, responsive to detecting a second computing device initially attempting to connect to a network, an unpopulated baseline profile for the second computing device; populate the baseline profile with initial processes running on the second computing device and initial system calls made by the initial processes during an initial operation time period of the second computing device; monitor, during a subsequent operation time period of the second computing device, subsequent processes running on the second computing device and subsequent system calls made by the subsequent processes; and detect an attack on the second computing device based on a comparison of the subsequent processes and the subsequent system calls to the populated baseline profile.

    Verifying intents in stateful networks using atomic address objects

    公开(公告)号:US11606301B2

    公开(公告)日:2023-03-14

    申请号:US16392160

    申请日:2019-04-23

    Abstract: Example method includes: receiving a plurality of intent-based network policies in a network, wherein each intent-based policy comprises at least a rule and an action to be performed by a network function on a network packet in response to the rule being matched; identifying a set of header address spaces comprising a plurality of addresses that match to a same set of rules and actions; creating an atomic address object representing the identified set of header address spaces; and verifying the plurality of intent-based network policies using the atomic address object.

Patent Agency Ranking