CENTRAL SCHEDULING FOR ENTERPRISE WIRELESS RANDOMIZING CHANGING/ROTATING MAC ADDRESS

    公开(公告)号:US20230353534A1

    公开(公告)日:2023-11-02

    申请号:US17731652

    申请日:2022-04-28

    CPC classification number: H04L61/5076 H04L61/5007 H04L61/5061

    Abstract: A method is provided that is performed for a wireless network that includes one or more wireless client devices that may rotate their media access control (MAC) address used for wireless communication with one or more wireless access point devices in the wireless network. The method includes determining an impact of MAC address rotation by the one or more wireless client devices on operational resources of one or more networking devices or networking processes in a network infrastructure associated with the wireless network. The method further includes scheduling MAC address rotation by the one or more wireless client devices according to the impact on operational resources of the one or more networking devices or networking processes in the network infrastructure.

    DYNAMIC WORKLOAD PLACEMENT USING CLOUD SERVICE ENERGY IMPACT

    公开(公告)号:US20230236899A1

    公开(公告)日:2023-07-27

    申请号:US17582333

    申请日:2022-01-24

    CPC classification number: G06F9/505 G06F11/3433

    Abstract: This disclosure describes dynamically placing workloads using cloud service energy efficiency. The techniques include obtaining energy efficiency metrics (EEMs) that indicate the carbon footprint for different data centers of cloud service providers. In some configurations, an Energy Efficiency Quotient (EEQ) may be generated by an Energy Telemetry Engine (ETE) that indicates the energy efficiency for each data center/Point of Presence (POP) where a workload may be migrated/hosted. The ETE can be used to rank the different host locations (e.g., different data according to their EEQ. In some examples, one or more other metrics (e.g., latency, bandwidth, . . . ) may be used to identify any POPs that do not meet specified conditions (e.g., latency constraints, bandwidth constraints, . . . ). When a suitable host location is determined (e.g. a POP meets both the performance and EEQ specifications), the workload may be placed onto one or more resources of the selected data center.

    Secure creation of application containers for fifth generation cellular network slices

    公开(公告)号:US11558779B2

    公开(公告)日:2023-01-17

    申请号:US17684263

    申请日:2022-03-01

    Abstract: Systems, methods, and computer-readable media for the secure creation of application containers for 5G slices. A MEC application in a MEC layer of a 5G network can be associated with a specific network slice of the 5G network. A backhaul routing policy for the MEC application can be defined based on the association of the MEC application with the specific network slice of the 5G network. Further, a SID for the MEC application that associates the MEC application with a segment routing tunnel through a backhaul of the 5G network can be generated. A MEC layer access policy for the MEC application can be defined based on the SID for the MEC application. As follows, access to the MEC application through the 5G network can be controlled based on both the backhaul routing policy for the MEC application and the MEC layer access policy for the application.

    Dynamic allocation and re-allocation of learning model computing resources

    公开(公告)号:US11556384B2

    公开(公告)日:2023-01-17

    申请号:US16818955

    申请日:2020-03-13

    Abstract: This disclosure describes techniques for improving allocation of computing resources to computation of machine learning tasks, including on massive computing systems hosting machine learning models. A method includes a computing system, based on a computational metric trend and/or a predicted computational metric of a past task model, allocating a computing resource for computing of a machine learning task by a current task model prior to runtime of the current task model; computing the machine learning task by executing a copy of the current task model; quantifying a computational metric of the copy of the current task model; determining a computational metric trend based on the computational metric; deriving a predicted computational metric of the copy of the current task model based on the computational metric; and, based on the computational metric trend, changing allocation of a computing resource for computing of the machine learning task by the current task model.

    Systems and methods providing a station with a suggestion to transition from Wi-Fi to LTE

    公开(公告)号:US11503452B2

    公开(公告)日:2022-11-15

    申请号:US17110036

    申请日:2020-12-02

    Abstract: A method performed by a system which manages station transition from a Wi-Fi access point includes sending, based on the station roaming to an edge-of-domain access point, a request to neighboring access points to the edge-of-domain access point for neighbor reports. The method includes receiving a cellular signal value from the station, comparing a first signal grade associated with the edge-of-domain access point to a second signal grade associated with the cellular signal value to yield a comparison and generating a link usability rating associated with a link between the station and the edge-of-domain access point. Based at least in part on the comparison and the link usability rating, the method includes transmitting a message to the station suggesting that the station roam from the edge-of-domain access point to a cellular network. An edge of the domain can also be dynamic and vary based on station characteristics.

    FUNCTION-AS-A-SERVICE (FAAS) MODEL FOR SPECIALIZED PROCESSING UNITS

    公开(公告)号:US20220164918A1

    公开(公告)日:2022-05-26

    申请号:US17669647

    申请日:2022-02-11

    Abstract: A server that includes a graphics processing unit (GPU) may receive, from a first application that is remote from the server, a first request to reserve a first number of cores of the GPU for a first amount of time. The server may also receive, from a second application that is also remote from the server, a second request to reserve a second number of cores of the GPU for a second amount of time that at least partly overlaps the first amount of time. The server may determine that the first request is associated with a higher priority than the second request and, in response, may reserve the first number of cores for the first amount of time for the first application. The server may send, to the first application, an indication that the first number of cores have been reserved as requested by the first application.

    CLOUD SERVICE DATACENTER SELECTION BASED ON DATA SOVEREIGNTY POLICIES

    公开(公告)号:US20220159064A1

    公开(公告)日:2022-05-19

    申请号:US16950132

    申请日:2020-11-17

    Abstract: Cloud services are provided by a distributed network including a number of geographically distributed datacenters, to client devices in accordance with data sovereignty requirements. A server within the distributed network may receive a service request and determine whether it complies with the data sovereignty requirements of the client. When the geographic location of the server does not comply with the client's data sovereignty requirements, the server may determine and transmit back to the client device a set of alternative datacenters within the distributed network that comply with the client's data sovereignty requirements. The client device may use network probes to select an alternative datacenter, and the cloud service request of the client device may be migrated from the server to the selected datacenter.

    Proactive wireless traffic capture for network assurance

    公开(公告)号:US11246046B2

    公开(公告)日:2022-02-08

    申请号:US15904746

    申请日:2018-02-26

    Abstract: In one embodiment, a computing device determines one or more profiles of respective wireless network issues, each of the one or more profiles having a set of associated parameters. By monitoring wireless conditions in a particular wireless network, the computing device may then detect that the wireless conditions exhibit trigger conditions correlated to a particular set of associated parameters for a particular profile of a particular wireless network issue. In response to detecting that the wireless conditions exhibit trigger conditions, the computing device may then capture and store data regarding the wireless conditions, accordingly.

Patent Agency Ranking